Open YARA scan- and search engine
☆26Feb 23, 2025Updated last year
Alternatives and similar repositories for YARAify
Users that are interested in YARAify are comparing it to the libraries listed below
Sorting:
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 8 months ago
- Attempt to replicate the functions of auto_rip by Corey Harrell in Python.☆12Aug 4, 2024Updated last year
- IDA plugin to deobfuscate emotet CFF☆18Apr 26, 2022Updated 3 years ago
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- Forensic Reconstruction of Severely Degraded License Plates, Electronic Imaging, 2019.☆18Apr 27, 2022Updated 3 years ago
- visually see issues with supported cipher suites☆17Jun 18, 2024Updated last year
- qiling framework examples☆16Jan 17, 2022Updated 4 years ago
- ☆22Jun 9, 2025Updated 8 months ago
- Python library for Google Safe Browsing v2 Lookup API☆25Jan 25, 2022Updated 4 years ago
- **SCAM ALERT !!!!!!! ALPHABAY VE DARK WEB TURKİSH DOLANDIRICIDIR BU KONUYU AÇANLARDA KENDİLERİDİR UZAK DURUN** **BÜYÜK BİR DOLANDIRICIL…☆10Jul 14, 2023Updated 2 years ago
- Source code and writeups for all challenges☆16May 29, 2022Updated 3 years ago
- Live malware samples and database, daily update.☆32Apr 29, 2025Updated 10 months ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆23Feb 11, 2025Updated last year
- Mythic Developer Series: Workshop Golang Agent☆25Jun 27, 2023Updated 2 years ago
- ☆23Jul 7, 2023Updated 2 years ago
- Slides that are used in the courses of AUCC☆20Oct 14, 2024Updated last year
- Open platform for sharing confirmed Malware samples☆39Nov 9, 2024Updated last year
- Automatic XSS Vulnerability Scanner, Dorker, and Payload Injector☆25Oct 3, 2024Updated last year
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- Be careful not to infect yourself when accessing and experimenting with malicious software.☆28Oct 25, 2024Updated last year
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Apr 14, 2023Updated 2 years ago
- A collection of malwares found on the internet.☆64May 16, 2023Updated 2 years ago
- This repository has been archived in favor of https://github.com/idaholab/Malcolm-Test-Artifacts☆37Dec 11, 2024Updated last year
- ☆10Apr 20, 2022Updated 3 years ago
- Grabs data from IVRE and brings it into Obsidian notes☆36Updated this week
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- Git Web Hook Tunnel for C2☆28Nov 7, 2023Updated 2 years ago
- Event Masker is a Splunk streaming command to mask event from search based on a list of rules that contain conditions.☆16Oct 11, 2022Updated 3 years ago
- Malware Classifier From Network Captures☆82Jan 27, 2017Updated 9 years ago
- ☆11Oct 14, 2020Updated 5 years ago
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- Custom variants for ULTRAKILL.☆12Jul 27, 2025Updated 7 months ago
- ☆10Dec 3, 2021Updated 4 years ago
- The telegram bot provides basic subscription for premium (non telegram premium, only bot's own). Uses some telegram payment methods☆10Mar 30, 2023Updated 2 years ago
- Proof of concept code for CVE-2023-2008☆40Jun 12, 2023Updated 2 years ago
- CANAPE Network Testing Tool☆34Sep 25, 2018Updated 7 years ago
- ☆41Apr 5, 2025Updated 10 months ago
- Automated WireGuard Deployment on Azure☆46Feb 28, 2021Updated 5 years ago