YARA Rule Strings Statistics Calculator and Malware Research Helper
☆14Jul 24, 2021Updated 4 years ago
Alternatives and similar repositories for statiStrings
Users that are interested in statiStrings are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Nov 25, 2021Updated 4 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- Repository of Yara rules created by the Stratosphere team☆29Jul 8, 2021Updated 4 years ago
- A yara based MCP Server☆22Updated this week
- ☆23Dec 15, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Feb 15, 2022Updated 4 years ago
- Yara rules☆21Mar 27, 2023Updated 3 years ago
- A collection of my reverse engineering and malware analysis write-ups☆21Dec 11, 2020Updated 5 years ago
- ☆27Mar 2, 2022Updated 4 years ago
- open source malware analysis and research notes dump☆26Aug 30, 2023Updated 2 years ago
- Random hunting ordiented yara rules☆96Mar 27, 2023Updated 3 years ago
- A decryptor for systems infected by Avaddon ransomware.☆25Oct 29, 2024Updated last year
- My collection of unpackers for malware packers/crypters☆28Aug 24, 2017Updated 8 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆30Jun 11, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Reviews and tests of security products☆17Dec 28, 2024Updated last year
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 8 years ago
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated 4 months ago
- ☆23Aug 1, 2020Updated 5 years ago
- Dump1090 is a simple Mode S decoder for RTLSDR devices☆11Jan 6, 2023Updated 3 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Aug 18, 2020Updated 5 years ago
- Slides and sample code for "Practical DevOps Training" (Spring 2016)☆12May 31, 2016Updated 9 years ago
- ☆10Oct 9, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆24Jul 6, 2018Updated 7 years ago
- A Powershell script for signing or adding signatures to tap-windows6 drivers☆10Apr 18, 2019Updated 7 years ago
- mod to myaut2exe decompiler☆19Jul 28, 2017Updated 8 years ago
- ☆13Sep 21, 2021Updated 4 years ago
- Lazarus analysis tools and research report☆58Dec 22, 2023Updated 2 years ago
- Example Suricata rules implementing some of my detection tactics☆22Jan 13, 2023Updated 3 years ago
- IronWASP module to test security of SSL services. Ported from http://www.bolet.org/TestSSLServer/☆12Sep 2, 2013Updated 12 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Feb 24, 2023Updated 3 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆12Apr 30, 2014Updated 12 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A kernel extension to mitigate Gatekeeper bypasses☆49Nov 9, 2015Updated 10 years ago
- Collection of generic YARA rules☆16Mar 18, 2026Updated last month
- enpoint detection / live analysis & sandbox host / signatures quality test☆44Apr 22, 2021Updated 5 years ago
- ☆17Nov 12, 2017Updated 8 years ago
- Suricata LUA scripts to detect CVE-2019-12255, CVE-2019-12256, CVE-2019-12258, and CVE-2019-12260☆19Nov 28, 2019Updated 6 years ago
- Configuration Extractors for Malware☆125Apr 23, 2025Updated last year
- An uploader honeypot designed to look like poor website security.☆29Apr 19, 2025Updated last year