ail-project / ail-yara-rules
A set of YARA rules for the AIL framework to detect leak or information disclosure
☆38Updated 2 months ago
Alternatives and similar repositories for ail-yara-rules:
Users that are interested in ail-yara-rules are comparing it to the libraries listed below
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- various slides and presentations I've worked on☆18Updated last month
- C# User Simulation☆32Updated 2 years ago
- ☆22Updated 4 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- ☆22Updated last year
- Tweettioc Splunk App☆20Updated 4 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Surface Analysis System on Cloud☆19Updated last year
- ☆15Updated 3 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- Analytics for Accounting logs from Network devices☆17Updated 4 years ago
- A rogue DNS detector☆23Updated last year
- ☆23Updated 4 years ago
- ProcDot Malware Sandbox☆24Updated 5 months ago
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆13Updated 2 years ago
- Generate YARA rules for OOXML documents.☆38Updated last year
- Links to malware-related YARA rules☆15Updated 2 years ago
- ☆28Updated 3 months ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- ☆14Updated 6 years ago
- ☆34Updated 2 years ago
- Yara rules☆21Updated 2 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Updated 3 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago