☆23Jul 7, 2023Updated 2 years ago
Alternatives and similar repositories for Detection
Users that are interested in Detection are comparing it to the libraries listed below
Sorting:
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 8 months ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- Conti V3 source code updated☆11Jun 30, 2022Updated 3 years ago
- ☆12Aug 8, 2019Updated 6 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- ☆25Jan 8, 2024Updated 2 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 7 years ago
- JPCERT/CC public YARA rules repository☆109Mar 9, 2026Updated last week
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Jul 16, 2019Updated 6 years ago
- Signatures and IoCs from public Volexity blog posts.☆366Dec 4, 2025Updated 3 months ago
- ☆14Aug 21, 2022Updated 3 years ago
- ☆129Feb 2, 2025Updated last year
- ☆22Dec 22, 2020Updated 5 years ago
- YARI is an interactive debugger for YARA Language.☆90Sep 10, 2025Updated 6 months ago
- Repository of Yara Rules☆141Updated this week
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆76Jan 6, 2026Updated 2 months ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- Binarly SDK v1☆14Dec 18, 2016Updated 9 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Jul 10, 2025Updated 8 months ago
- Yara Rules for Modern Malware☆78Mar 3, 2024Updated 2 years ago
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- An open source virus scan aggregation framework.☆25Apr 25, 2014Updated 11 years ago
- LILO based Pulse Secure appliance disk image decryptor☆13Mar 20, 2024Updated 2 years ago
- A collection of curated YARA rules used as part of the Filescan.io service☆22Feb 18, 2026Updated last month
- A C# based tool for analysing malicious OneNote documents☆117Apr 4, 2023Updated 2 years ago
- Some YARA rules i will add from time to time☆67Mar 25, 2023Updated 2 years ago
- Splunk Add-on for PowerShell provides field extraction for PowerShell event logs.☆17Feb 1, 2021Updated 5 years ago
- A curated collection of Living off the Land (LotL) attack demonstrations where trusted binaries go rogue, because if it didn’t launch cal…☆35Jan 7, 2026Updated 2 months ago
- Automatic YARA rule generation for Malpedia☆168Sep 8, 2022Updated 3 years ago
- Lazarus analysis tools and research report☆57Dec 22, 2023Updated 2 years ago
- macOS triage is a python script to collect various macOS logs, artifacts, and other data.☆25Mar 25, 2021Updated 4 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- Library and tools to access the GUID Partition Table (GPT) volume system format☆11Dec 20, 2025Updated 3 months ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Feb 6, 2023Updated 3 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Feb 24, 2023Updated 3 years ago
- Bro PCAP Processing and Tagging API☆28Nov 9, 2017Updated 8 years ago