StefanKelm / yara-rulesView external linksLinks
Links to malware-related YARA rules
☆15Sep 29, 2022Updated 3 years ago
Alternatives and similar repositories for yara-rules
Users that are interested in yara-rules are comparing it to the libraries listed below
Sorting:
- ☆19Oct 23, 2020Updated 5 years ago
- ☆14Jun 26, 2020Updated 5 years ago
- Adversary Simulation Framework☆39Aug 19, 2025Updated 5 months ago
- Visualize Microsoft Defender XDR process trees and security events☆33Aug 24, 2025Updated 5 months ago
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Mar 13, 2022Updated 3 years ago
- Cheat Sheets, Metodologies etc.☆19Apr 12, 2019Updated 6 years ago
- Random hunting ordiented yara rules☆96Mar 27, 2023Updated 2 years ago
- List of Awesome Vertex Synapse Resources☆28Aug 6, 2024Updated last year
- A highly available AWS deployment of the Threat Intelligence platform, OpenCTI using Terraform. Native AWS resources are used where feasi…☆38Apr 23, 2023Updated 2 years ago
- ☆128Feb 2, 2025Updated last year
- A python library to parse OneNote (.one) files☆141Jul 11, 2024Updated last year
- Quick analysis focusing on most important of a Malware or a Threat☆41Sep 4, 2023Updated 2 years ago
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆61Aug 18, 2025Updated 5 months ago
- ☆36Jul 11, 2018Updated 7 years ago
- CQL Hub is an open repository of detection and hunting queries for CrowdStrike NextGen SIEM and Falcon LogScale. All queries stored here …☆33Feb 2, 2026Updated 2 weeks ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- TG 2016 hacking compo repo☆10Mar 31, 2016Updated 9 years ago
- UWPStation is an app that looks like VMware Workstation.☆10Jul 1, 2024Updated last year
- A Windows information stealer / credential stealer written in Go for security research and malware analysis. Demonstrates browser passwo…☆26Dec 15, 2025Updated 2 months ago
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 2 months ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆40Apr 8, 2021Updated 4 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆94Feb 4, 2023Updated 3 years ago
- A MITRE Caldera plugin☆49Oct 6, 2025Updated 4 months ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆37Nov 8, 2017Updated 8 years ago
- ☆10Jan 21, 2022Updated 4 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- ☆13Oct 21, 2022Updated 3 years ago
- Various Crypter Project☆10Feb 26, 2014Updated 11 years ago
- Simple interface to libmagic for Go Programming Language☆13Jan 10, 2021Updated 5 years ago
- C# & Node.js Encrypt/Decrypt☆12Jul 13, 2018Updated 7 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- Go bindings for yara: pattern matching swiss knife http://plusvic.github.io/yara/☆10Jul 21, 2015Updated 10 years ago
- Yara matching in ElasticSearch.☆10Jun 12, 2018Updated 7 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- Google Hack Database Web Site Scrapper w/ DB updater utility. ASP.NET MVC web utility and Windows application for generating google hack …☆11Jun 23, 2016Updated 9 years ago
- ☆11Dec 17, 2024Updated last year
- A signature updater and optional private mirroring server for ClamAV☆10Aug 2, 2017Updated 8 years ago
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 4 months ago