abusech / YARAify
Open YARA scan- and search engine
☆17Updated last week
Related projects ⓘ
Alternatives and complementary repositories for YARAify
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 2 years ago
- Security and Privacy Failures in Popular 2FA Apps☆19Updated last year
- Developper-proof prevention of SQL injection (java library)☆11Updated 3 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆12Updated 2 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 2 years ago
- Automatic generator of YARA modules based in protocol buffers☆14Updated 2 months ago
- Publishing advisories for CVEs found by POST Cyberforce☆12Updated 4 months ago
- Python support package to parse IP and host inputs from network based tooling☆11Updated last year
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆17Updated 2 years ago
- ZAP plugin demonstrating custom view for WebSocket messages.☆13Updated 2 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆17Updated 3 years ago
- ☆15Updated 2 years ago
- ☆26Updated 2 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- Standardizing Security Titles☆13Updated last year
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 3 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- Web based favicon recon tool made using streamlit.☆9Updated 2 years ago
- ☆12Updated 3 years ago
- ☆14Updated 5 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service and versions.☆17Updated 6 months ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 5 years ago
- Golang port for Metasploit's pattern_create and pattern_offset☆12Updated 3 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆14Updated last year