☆10Dec 28, 2015Updated 10 years ago
Alternatives and similar repositories for snortsig
Users that are interested in snortsig are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- Sighting DB is designed to scale writing and reading a count of attributes, tracking when if was first and last seen☆17Apr 11, 2024Updated 2 years ago
- ☆17Mar 22, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- The high-level/low-level implementation of Linux Fanotify.☆24Nov 11, 2025Updated 5 months ago
- Detect HTTP stalling attacks like slowloris with Bro☆19Mar 1, 2018Updated 8 years ago
- Unfetter Insight performs natural language processing and analysis for text data to determine and convert to CTI Stix data automatically.☆20Sep 4, 2018Updated 7 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- Universal Forensic Indexer and Analyzer☆10Jan 8, 2017Updated 9 years ago
- Rust implementation of the DCSO Bloom filter☆29Jul 15, 2025Updated 9 months ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- integrating bro into yara☆33Dec 9, 2014Updated 11 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 12 years ago
- JSON-based DSLs are not for humans..☆10Sep 4, 2014Updated 11 years ago
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- KLEE-fl : Compile Project to Bitcode and Try Fuzzing with KLEE .☆31Apr 7, 2019Updated 7 years ago
- Yara intergrated into BurpSuite☆48Jun 30, 2016Updated 9 years ago
- ☆14Oct 5, 2013Updated 12 years ago
- A tool designed for consistent and safe capture of off network web resources.☆39Mar 24, 2017Updated 9 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- AYY LMAO☆12Aug 27, 2015Updated 10 years ago
- ☆15Nov 29, 2017Updated 8 years ago
- Custom rules for yara-integrated scans☆16Jun 5, 2013Updated 12 years ago
- Yara filetype plugin for Vim.☆14Feb 18, 2021Updated 5 years ago
- Simple Distributed IOC Scanner☆12Jul 27, 2015Updated 10 years ago
- Python API wrapper for the Joe Sandbox API.☆69Jan 19, 2026Updated 3 months ago
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆41Mar 17, 2019Updated 7 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A scalable framework for binary analysis in a containered environment.☆13May 20, 2019Updated 6 years ago
- YARA duplicate rule detection and removal. YARA rule index creation. YARA rule file merger.☆10Jan 19, 2026Updated 3 months ago
- Term List Matching Plugin for ElasticSearch☆26Jan 20, 2014Updated 12 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Sep 17, 2015Updated 10 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- ☆74Feb 17, 2022Updated 4 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago