Neo23x0 / yara-uuid-generatorView external linksLinks
A tool that adds reproducible UUIDs to YARA rules
☆13Apr 24, 2024Updated last year
Alternatives and similar repositories for yara-uuid-generator
Users that are interested in yara-uuid-generator are comparing it to the libraries listed below
Sorting:
- Simple tool to extract icons from a pe file and other useful information☆13Jun 22, 2018Updated 7 years ago
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago
- A collection of my yara rules☆34Jul 11, 2023Updated 2 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated last year
- JSNotify is a Python script designed to monitor JavaScript files in a specified directory for changes. This tool can be used by developer…☆18Nov 15, 2023Updated 2 years ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Dec 15, 2023Updated 2 years ago
- A utility that can be used to launch an executable with a DLL injected☆19Nov 20, 2023Updated 2 years ago
- Top hashpwn rules☆21Dec 12, 2025Updated 2 months ago
- Everything You Need☆18Oct 3, 2020Updated 5 years ago
- Modular malware analysis artifact collection and correlation framework☆54Apr 23, 2024Updated last year
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated last year
- ☆27Aug 18, 2023Updated 2 years ago
- A vSphere deployment of GOADv2 BETA Testing (v0.1)☆26Dec 22, 2023Updated 2 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Mar 29, 2022Updated 3 years ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆40Jan 23, 2024Updated 2 years ago
- A BurpSuite extension for vulnerability Scanning☆28Feb 16, 2024Updated 2 years ago
- Windows Thread Pool Injection Havoc Implementation☆33Mar 23, 2024Updated last year
- I have documented all of the AMSI patches that I learned till now☆75Nov 4, 2025Updated 3 months ago
- Python Script for Spamming Emails with Attachments☆10Jan 4, 2020Updated 6 years ago
- Offensive Research Guide to Help Defense Improve Detection☆32Jan 27, 2023Updated 3 years ago
- Vulnerability Research and Proof of Concept exploits for various targets☆35Jan 4, 2023Updated 3 years ago
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures☆38Sep 22, 2024Updated last year
- Scapy hands-on☆36Nov 16, 2023Updated 2 years ago
- ☆37Sep 30, 2021Updated 4 years ago
- ☆11Jun 28, 2022Updated 3 years ago
- Bxi crack version☆10Jul 7, 2022Updated 3 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Aug 22, 2023Updated 2 years ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆85Nov 22, 2023Updated 2 years ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- Leech Tools (Free Version) provides fraud tools such us Credit Card Generator, Bank Identification Number Lookup and Credit Card Validity…☆11May 9, 2019Updated 6 years ago
- Generate Go bindings for shared C libraries.☆15Jul 13, 2024Updated last year
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- ☆11Apr 25, 2021Updated 4 years ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- A group of ComfyUI nodes created by https://app.comflowy.com☆16Dec 3, 2024Updated last year
- Python package for handling CI and other integrations☆10Feb 9, 2026Updated last week
- Activate Windows & Office 🔑☆13Jun 15, 2024Updated last year