Links to malware-related YARA rules
☆15Sep 29, 2022Updated 3 years ago
Alternatives and similar repositories for yara-rules
Users that are interested in yara-rules are comparing it to the libraries listed below
Sorting:
- ☆19Oct 23, 2020Updated 5 years ago
- ☆14Jun 26, 2020Updated 5 years ago
- Adversary Simulation Framework☆38Aug 19, 2025Updated 6 months ago
- Visualize Microsoft Defender XDR process trees and security events☆33Aug 24, 2025Updated 6 months ago
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Mar 13, 2022Updated 3 years ago
- ☆23Dec 15, 2022Updated 3 years ago
- Simple C++ cryptolocker Blowfish CBC☆18Apr 13, 2019Updated 6 years ago
- Random hunting ordiented yara rules☆96Mar 27, 2023Updated 2 years ago
- windows tiny reverse shell☆27Mar 21, 2022Updated 3 years ago
- List of Awesome Vertex Synapse Resources☆28Aug 6, 2024Updated last year
- A highly available AWS deployment of the Threat Intelligence platform, OpenCTI using Terraform. Native AWS resources are used where feasi…☆39Apr 23, 2023Updated 2 years ago
- ☆129Feb 2, 2025Updated last year
- This is a repository that is meant to hold detections for various process injection techniques.☆34Mar 3, 2020Updated 6 years ago
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆61Aug 18, 2025Updated 6 months ago
- Quick analysis focusing on most important of a Malware or a Threat☆38Sep 4, 2023Updated 2 years ago
- ☆36Jul 11, 2018Updated 7 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- A Windows information stealer / credential stealer written in Go for security research and malware analysis. Demonstrates browser passwo…☆26Dec 15, 2025Updated 2 months ago
- Python Exploitation Framework☆30Updated this week
- UEFI signing tools for Linux -- Forked to support AWS CloudHSM☆13Aug 25, 2021Updated 4 years ago
- TG 2016 hacking compo repo☆10Mar 31, 2016Updated 9 years ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆40Apr 8, 2021Updated 4 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆94Feb 4, 2023Updated 3 years ago
- A MITRE Caldera plugin☆49Updated this week
- 基于upx的SM4加密壳☆10May 12, 2023Updated 2 years ago
- This is the gandcrab v5.0.3 javascript dropper☆10Apr 29, 2020Updated 5 years ago
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆19May 9, 2025Updated 10 months ago
- Generate Ghidra class structures☆12Jan 3, 2020Updated 6 years ago
- A PoC of Go AES with a key protected in memory☆13May 10, 2018Updated 7 years ago
- ☆10Jan 4, 2015Updated 11 years ago
- Ransonware simples, criptografa arquivos e volta ao normal com a chave fornecida☆10Jan 28, 2021Updated 5 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Go bindings for yara: pattern matching swiss knife http://plusvic.github.io/yara/☆10Jul 21, 2015Updated 10 years ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- ☆12Mar 24, 2018Updated 7 years ago
- PowerShell script to get domain mail info and control status such as MX, SPF, DKIM, DMARC and StartTLS.☆12May 20, 2025Updated 9 months ago
- C# & Node.js Encrypt/Decrypt☆12Jul 13, 2018Updated 7 years ago