The pattern matching swiss knife
☆9,563Feb 10, 2026Updated 2 months ago
Alternatives and similar repositories for yara
Users that are interested in yara are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository of yara rules☆4,759Apr 17, 2024Updated 2 years ago
- A curated list of awesome YARA rules, tools, and people.☆4,182Mar 16, 2026Updated last month
- Loki - Simple IOC and YARA Scanner☆3,749Jan 12, 2026Updated 3 months ago
- Main Sigma Rule Repository☆10,355Updated this week
- yarGen is a generator for YARA rules☆1,785Jan 10, 2026Updated 3 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- The Python interface for YARA☆738Updated this week
- Cuckoo Sandbox is an automated dynamic malware analysis system☆5,954May 3, 2022Updated 3 years ago
- An advanced memory forensics framework☆8,005May 16, 2025Updated 11 months ago
- YARA signature and IOC database for my scanners and tools☆2,929Apr 20, 2026Updated last week
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆6,256Updated this week
- A little tool to play with Windows security☆21,464Apr 17, 2026Updated last week
- Defund the Police.☆13,686Jun 7, 2024Updated last year
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,860Updated this week
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,973Updated this week
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Impacket is a collection of Python classes for working with network protocols.☆15,655Updated this week
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,593Mar 20, 2026Updated last month
- Six Degrees of Domain Admin☆10,529Mar 2, 2026Updated last month
- Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.☆7,589Updated this week
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,976Apr 21, 2026Updated last week
- UNIX-like reverse engineering framework and command-line toolset☆23,502Updated this week
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,953Aug 17, 2020Updated 5 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,832Jan 19, 2020Updated 6 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,537Jan 12, 2026Updated 3 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- TheHive is a Collaborative Case Management Platform, now distributed as a commercial version☆3,905Jul 25, 2025Updated 9 months ago
- Sysmon configuration file template with default high-quality event tracing☆5,493Jul 3, 2024Updated last year
- Automated Adversary Emulation Platform☆6,919Updated this week
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,471Mar 16, 2026Updated last month
- Metasploit Framework☆38,037Updated this week
- Indicators of Compromises (IOC) of our various investigations☆1,946Updated this week
- Yara integrated software to handle archive file data.☆322May 9, 2022Updated 3 years ago
- Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OIS…☆6,186Updated this week
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open…☆12,942Apr 1, 2026Updated 3 weeks ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A curated list of Awesome Threat Intelligence resources☆10,116Jan 19, 2026Updated 3 months ago
- Arkime is an open source, large scale, full packet capturing, indexing, and database system.☆7,358Updated this week
- Volatility 3.0 development☆4,085Updated this week
- CTF framework and exploit development library☆13,391Apr 19, 2026Updated last week
- Ghidra is a software reverse engineering (SRE) framework☆67,729Updated this week
- Rekall Memory Forensic Framework☆2,003Oct 18, 2020Updated 5 years ago
- GRR Rapid Response: remote live forensics for incident response☆5,057Apr 16, 2026Updated last week