StefanKelm / yara-rulesView external linksLinks
Links to malware-related YARA rules
☆15Sep 29, 2022Updated 3 years ago
Alternatives and similar repositories for yara-rules
Users that are interested in yara-rules are comparing it to the libraries listed below
Sorting:
- ☆19Oct 23, 2020Updated 5 years ago
- Adversary Simulation Framework☆38Aug 19, 2025Updated 5 months ago
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Mar 13, 2022Updated 3 years ago
- ☆23Dec 15, 2022Updated 3 years ago
- Cheat Sheets, Metodologies etc.☆19Apr 12, 2019Updated 6 years ago
- Simple C++ cryptolocker Blowfish CBC☆18Apr 13, 2019Updated 6 years ago
- Random hunting ordiented yara rules☆96Mar 27, 2023Updated 2 years ago
- List of Awesome Vertex Synapse Resources☆28Aug 6, 2024Updated last year
- Import specific data sources into the Sigma generic and open signature format.☆79May 6, 2022Updated 3 years ago
- A python library to parse OneNote (.one) files☆142Jul 11, 2024Updated last year
- Quick analysis focusing on most important of a Malware or a Threat☆41Sep 4, 2023Updated 2 years ago
- ☆36Jul 11, 2018Updated 7 years ago
- UWPStation is an app that looks like VMware Workstation.☆10Jul 1, 2024Updated last year
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- A Windows information stealer / credential stealer written in Go for security research and malware analysis. Demonstrates browser passwo…☆26Dec 15, 2025Updated 2 months ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- Code to Scraping some portion of Data from forum(RaidForums[seized by FBI]) with Python SCRAPY spiders bypassing recaptcha and storing to…☆10Feb 25, 2021Updated 4 years ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆40Apr 8, 2021Updated 4 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆94Feb 4, 2023Updated 3 years ago
- ☆10Jan 4, 2015Updated 11 years ago
- fswatch - Watch for changes in file system☆12Jun 13, 2019Updated 6 years ago
- Go bindings for yara: pattern matching swiss knife http://plusvic.github.io/yara/☆10Jul 21, 2015Updated 10 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- nsq client for c language☆13Dec 2, 2017Updated 8 years ago
- ☆13Oct 21, 2022Updated 3 years ago
- This is my malware database, but I AM NOT RESPONSIABLE FOR ANY DAMAGE + pan koza is a skid and ready to fork this $h!t.☆12May 26, 2024Updated last year
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 4 months ago
- C# & Node.js Encrypt/Decrypt☆12Jul 13, 2018Updated 7 years ago
- This is the gandcrab v5.0.3 javascript dropper☆10Apr 29, 2020Updated 5 years ago
- CQL Hub is an open repository of detection and hunting queries for CrowdStrike NextGen SIEM and Falcon LogScale. All queries stored here …☆33Feb 2, 2026Updated 2 weeks ago
- Google Hack Database Web Site Scrapper w/ DB updater utility. ASP.NET MVC web utility and Windows application for generating google hack …☆11Jun 23, 2016Updated 9 years ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- Ransonware simples, criptografa arquivos e volta ao normal com a chave fornecida☆10Jan 28, 2021Updated 5 years ago
- A PoC of Go AES with a key protected in memory☆13May 10, 2018Updated 7 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- A basic python based tool for domain ℹ️ information gathering. I am working 💻 on collecting information related to domain whois, history…☆12Jan 11, 2026Updated last month
- CIDR to IP List Tool☆14Mar 12, 2016Updated 9 years ago
- ☆10Jan 21, 2022Updated 4 years ago
- ☆11Dec 17, 2024Updated last year