alt3kx / wafarayView external linksLinks
Enhance your malware detection with WAF + YARA (WAFARAY)
☆108Sep 29, 2022Updated 3 years ago
Alternatives and similar repositories for wafaray
Users that are interested in wafaray are comparing it to the libraries listed below
Sorting:
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- ☆19Oct 2, 2022Updated 3 years ago
- Extract C2 Traffic☆252Nov 25, 2024Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- the Open Source and Pure C++ Packer for eXecutables☆21Mar 25, 2023Updated 2 years ago
- ☆160Nov 26, 2023Updated 2 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- Infect Shared Files In Memory for Lateral Movement☆196Dec 14, 2022Updated 3 years ago
- Monarch - The Adversary Emulation Toolkit☆63Jan 7, 2025Updated last year
- Linux startup analyzer☆66Jun 2, 2025Updated 8 months ago
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 2 years ago
- Password list character frequency analyzer that can output hashcat masks☆16May 22, 2019Updated 6 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆473Aug 21, 2024Updated last year
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Jun 22, 2024Updated last year
- Visually inspect and force decode YARA and regex matches found in both binary and text data with colors. Lots of colors.☆147Feb 1, 2026Updated last week
- ☆70Oct 30, 2023Updated 2 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Jan 2, 2022Updated 4 years ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆201Jan 4, 2024Updated 2 years ago
- A co-simulation framework for reasearching cybersecurity in power grids.☆26Sep 24, 2025Updated 4 months ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆252Oct 29, 2025Updated 3 months ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆253Nov 18, 2024Updated last year
- ELFEN: Automated Linux Malware Analysis Sandbox☆136Aug 20, 2025Updated 5 months ago
- Yet Another Memory Analyzer for malware detection☆203Apr 8, 2025Updated 10 months ago
- APK Infrastructure Investigator☆65Jun 20, 2023Updated 2 years ago
- Cryptocurrency Discovery and Triage Tool - Identify multiple cryptocurrency addresses and transactions from various wallet applications!☆19Feb 3, 2026Updated last week
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Nov 8, 2023Updated 2 years ago
- Command & Control-Framework created for collaboration in python3☆322Aug 7, 2023Updated 2 years ago
- Shodan Monitoring integration for TheHive.☆130Dec 12, 2024Updated last year
- Roast in the Middle☆296Sep 19, 2025Updated 4 months ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- 🌒 Shell command obfuscation to avoid detection systems☆122Oct 10, 2022Updated 3 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Sep 15, 2022Updated 3 years ago
- OSED Practice binary☆25Nov 23, 2023Updated 2 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆98Jan 13, 2026Updated last month
- An Adaptive Misuse Detection System☆46Nov 4, 2024Updated last year
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 2 months ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆24Nov 22, 2021Updated 4 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆207Jul 21, 2022Updated 3 years ago