A yara based MCP Server
☆22Mar 9, 2026Updated last week
Alternatives and similar repositories for YaraFlux
Users that are interested in YaraFlux are comparing it to the libraries listed below
Sorting:
- ☆24Feb 18, 2025Updated last year
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated 2 months ago
- ☆10Sep 11, 2021Updated 4 years ago
- ☆11Oct 21, 2020Updated 5 years ago
- The method and files used to generate Sysmon event logs, push them to a remote Splunk, and ingest/normalize the data for analysis.☆10Sep 28, 2020Updated 5 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 3 months ago
- mult-answer plugin for CTFd☆15Aug 22, 2019Updated 6 years ago
- A Delphi symbol name recovery tool for reverse engineers.☆23Jan 17, 2026Updated 2 months ago
- Frontend for MalShare.com☆17Feb 15, 2026Updated last month
- ☆18May 30, 2025Updated 9 months ago
- ☆12Apr 1, 2023Updated 2 years ago
- ☆15Sep 26, 2022Updated 3 years ago
- Automated Yara Rule generation using Biclustering☆78Oct 8, 2025Updated 5 months ago
- Reviews and tests of security products☆17Dec 28, 2024Updated last year
- A repository to store community malware research notes and findings.☆15Feb 13, 2026Updated last month
- List with File Extensions used by Ransomware☆37Mar 5, 2026Updated 2 weeks ago
- Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques☆97Dec 28, 2025Updated 2 months ago
- Diaphora Machine Learning tools and datasets☆23Sep 23, 2024Updated last year
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆20May 9, 2025Updated 10 months ago
- ☆20Sep 23, 2018Updated 7 years ago
- SANS #CTI Summit 2025☆13Jan 28, 2025Updated last year
- Powerful Python tool to analyze PDF documents☆26May 15, 2022Updated 3 years ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 8 years ago
- ☆17Nov 13, 2024Updated last year
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 4 months ago
- ☆23Aug 1, 2020Updated 5 years ago
- suricata-check is a command line utility to provide feedback on Suricata rules. The tool can detect various issues including those coveri…☆20Nov 21, 2025Updated 3 months ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- Download all packet captures from http://malware-traffic-analysis.net/☆20Aug 14, 2014Updated 11 years ago
- Automated security investigation tool using Microsoft MCP Servers, GitHub Copilot, Python Modules and custom copilot-instructions.☆53Updated this week
- AI-Powered Reverse Engineering Plugin for IDA Pro☆137Updated this week
- Tools and scripts to deploy and manage OpenRelik instances☆16Mar 3, 2026Updated 2 weeks ago
- Malware Configuration And Payload Extraction☆20Feb 12, 2020Updated 6 years ago
- mod to myaut2exe decompiler☆19Jul 28, 2017Updated 8 years ago
- ☆48Jun 6, 2025Updated 9 months ago
- Example Suricata rules implementing some of my detection tactics☆22Jan 13, 2023Updated 3 years ago
- ☆23Dec 15, 2022Updated 3 years ago
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆24Aug 12, 2025Updated 7 months ago
- Analyst Unknown Cyber Range - a micro web service framework☆26Mar 5, 2025Updated last year