Helper scripts to automate the extraction of YARA rules from XProtectRemediators
☆22Mar 5, 2024Updated 2 years ago
Alternatives and similar repositories for XPR-dump
Users that are interested in XPR-dump are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mapping XProtect's obfuscated malware family names to common industry names.☆94Nov 14, 2025Updated 6 months ago
- ☆57Jul 1, 2024Updated last year
- Software installation scripts for macOS systems that allows you to setup a Virtual Machine (VM) for reverse engineering macOS malware☆38Feb 24, 2026Updated 2 months ago
- extract and parse WEVT_TEMPLATEs from PE files☆18Dec 30, 2023Updated 2 years ago
- Segment-accurate iBoot/SecureROM loader for Binary Ninja & IDA Pro☆53Mar 7, 2026Updated 2 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆35Oct 29, 2021Updated 4 years ago
- CoreFollowUp phishing attack on macOS☆15Mar 15, 2022Updated 4 years ago
- A minimal malware analysis sandbox for macOS☆34Feb 15, 2023Updated 3 years ago
- ☆14Jun 5, 2019Updated 6 years ago
- ☆10Dec 18, 2023Updated 2 years ago
- Linux BPF plugins for Volatility3☆23Jan 19, 2024Updated 2 years ago
- Simple security lookups via CLI☆16Jan 29, 2025Updated last year
- plugin for storing and using snippets of useful Binja script☆29Jan 11, 2026Updated 4 months ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- App to perform batch deletion of computer records in Jamf Protect☆21Jun 15, 2023Updated 2 years ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 8 months ago
- Tools for macOS Forensic Bootable media☆16May 20, 2020Updated 6 years ago
- A "custom" layer 4 protocol for raw socket communication on linux. Golang library.☆10Dec 20, 2018Updated 7 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆17Oct 8, 2016Updated 9 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Jan 6, 2021Updated 5 years ago
- Run commands with hidden console.☆31Jan 24, 2021Updated 5 years ago
- ida python scripts☆23Jul 23, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Slides and material from my conference presentations☆16Mar 30, 2024Updated 2 years ago
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- Random Loot Generator for the TTRPG "Bunkers & Badasses"☆12Dec 9, 2024Updated last year
- Ghidra plugin that adds a window showing the high P-code for the current function.☆19Mar 11, 2023Updated 3 years ago
- A library for fast parse & import of Windows Master File Table($MFT) into Elasticsearch.☆12May 11, 2026Updated last week
- An efficient tool for extracting files, directories, and alternate data streams directly from NTFS image files.☆22Apr 14, 2026Updated last month
- A Ghidra extension for reverse-engineering macOS binaries.☆20Jan 13, 2025Updated last year
- Parser for Sdba memory pool tags☆21Jul 16, 2021Updated 4 years ago
- ☆22Jul 17, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆111Jan 26, 2026Updated 3 months ago
- PDB Rewriting Rust Library☆29Apr 26, 2024Updated 2 years ago
- ☆26Apr 21, 2026Updated last month
- ☆32Oct 14, 2025Updated 7 months ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Sep 29, 2025Updated 7 months ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- Just Another broken Registry Parser (JARP)☆16May 23, 2024Updated 2 years ago