The pattern matching swiss knife
☆9,490Feb 10, 2026Updated last month
Alternatives and similar repositories for yara
Users that are interested in yara are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository of yara rules☆4,730Apr 17, 2024Updated last year
- A curated list of awesome YARA rules, tools, and people.☆4,163Mar 16, 2026Updated last week
- Loki - Simple IOC and YARA Scanner☆3,733Jan 12, 2026Updated 2 months ago
- Main Sigma Rule Repository☆10,224Updated this week
- yarGen is a generator for YARA rules☆1,781Jan 10, 2026Updated 2 months ago
- The Python interface for YARA☆734May 27, 2025Updated 9 months ago
- An advanced memory forensics framework☆7,982May 16, 2025Updated 10 months ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆5,928May 3, 2022Updated 3 years ago
- YARA signature and IOC database for my scanners and tools☆2,884Mar 9, 2026Updated 2 weeks ago
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆6,195Updated this week
- A little tool to play with Windows security☆21,350May 11, 2025Updated 10 months ago
- Defund the Police.☆13,538Jun 7, 2024Updated last year
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,718Updated this week
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,890Updated this week
- Impacket is a collection of Python classes for working with network protocols.☆15,560Updated this week
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,454Updated this week
- Six Degrees of Domain Admin☆10,558Mar 2, 2026Updated 3 weeks ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,923Updated this week
- Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.☆7,525Updated this week
- UNIX-like reverse engineering framework and command-line toolset☆23,269Updated this week
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,912Aug 17, 2020Updated 5 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,828Jan 19, 2020Updated 6 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,501Jan 12, 2026Updated 2 months ago
- TheHive is a Collaborative Case Management Platform, now distributed as a commercial version☆3,895Jul 25, 2025Updated 7 months ago
- Automated Adversary Emulation Platform☆6,831Updated this week
- Sysmon configuration file template with default high-quality event tracing☆5,438Jul 3, 2024Updated last year
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,384Mar 16, 2026Updated last week
- Metasploit Framework☆37,771Updated this week
- Indicators of Compromises (IOC) of our various investigations☆1,934Updated this week
- Yara integrated software to handle archive file data.☆322May 9, 2022Updated 3 years ago
- Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OIS…☆6,081Updated this week
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open…☆12,826Nov 19, 2025Updated 4 months ago
- A curated list of Awesome Threat Intelligence resources☆9,953Jan 19, 2026Updated 2 months ago
- Arkime is an open source, large scale, full packet capturing, indexing, and database system.☆7,327Updated this week
- CTF framework and exploit development library☆13,328Updated this week
- Ghidra is a software reverse engineering (SRE) framework☆65,820Mar 16, 2026Updated last week
- Volatility 3.0 development☆3,997Mar 16, 2026Updated last week
- Rekall Memory Forensic Framework☆1,999Oct 18, 2020Updated 5 years ago
- GRR Rapid Response: remote live forensics for incident response☆5,047Feb 16, 2026Updated last month