alt3kx / wafarayLinks
Enhance your malware detection with WAF + YARA (WAFARAY)
☆108Updated 2 years ago
Alternatives and similar repositories for wafaray
Users that are interested in wafaray are comparing it to the libraries listed below
Sorting:
- ☆57Updated 2 years ago
- All kinds of tiny shells☆58Updated 2 years ago
- Malware vulnerability intel tool for third-party attackers☆119Updated 7 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆20Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- C2 Automation using Linode☆82Updated 2 years ago
- Analyzing AD domains for security risks related to user accounts☆63Updated 2 years ago
- Just my findings of malwares☆43Updated 2 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 10 months ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆76Updated last year
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆100Updated last year
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- ☆66Updated 4 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- Reads and prints information from the website MalAPI.io☆38Updated 3 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated last month
- Script to test NetSec capabilities.☆21Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- ☆160Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- ☆20Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated last year
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- A list of awesome penetration testing tools and resources.☆80Updated last year
- ☆40Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 5 months ago
- God Mode Detection Rules☆134Updated 9 months ago