Neo23x0 / yarGen-GoLinks
A YARA rule generator
☆61Updated this week
Alternatives and similar repositories for yarGen-Go
Users that are interested in yarGen-Go are comparing it to the libraries listed below
Sorting:
- Make an Linux Kernel rootkit visible again.☆59Updated 11 months ago
- Malware Analysis tools☆26Updated last year
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆131Updated 9 months ago
- Docker container for running CobaltStrike 4.10☆38Updated last year
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆41Updated 10 months ago
- ☆18Updated last year
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆85Updated last year
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆105Updated 5 months ago
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆65Updated 6 months ago
- A curated collection of Living off the Land (LotL) attack demonstrations where trusted binaries go rogue, because if it didn’t launch cal…☆34Updated last month
- ☆35Updated last month
- ☆58Updated 7 months ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆63Updated 6 months ago
- Simulate Windows EXE for Malware Research!☆19Updated last year
- Attacking the cleanup_module function of a kernel module☆56Updated 7 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 11 months ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆75Updated last year
- Malware traffic obfuscation library☆39Updated 6 months ago
- ☆27Updated last year
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆89Updated 2 months ago
- A Repository to Track Anti-Forensic Techniques☆118Updated 2 years ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆94Updated 5 months ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Updated 2 years ago
- Analyse MSI files for vulnerabilities☆143Updated last year
- .NET tool used to enrich RPC telemetry☆101Updated 2 weeks ago
- some leaked src code for known and unknown malwares☆23Updated 5 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Updated 5 months ago
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆39Updated 4 months ago
- POC of GITHUB simple C2 in rust☆52Updated 6 months ago