alt3kx / wafaray
Enhance your malware detection with WAF + YARA (WAFARAY)
☆107Updated 2 years ago
Alternatives and similar repositories for wafaray:
Users that are interested in wafaray are comparing it to the libraries listed below
- ☆56Updated last year
- Malware vulnerability intel tool for third-party attackers☆114Updated 3 months ago
- VLAN ID Parser☆6Updated 9 months ago
- Analyzing AD domains for security risks related to user accounts☆63Updated 2 years ago
- C2 Automation using Linode☆80Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated 11 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆104Updated 2 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆97Updated last year
- Search for c2 servers based on netlas☆39Updated last year
- ☆79Updated last year
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 2 months ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- Collaborative pentest tool with highly customizable tools☆71Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆62Updated 5 months ago
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆20Updated 2 years ago
- ☆64Updated 3 years ago
- masscan with exclusive excludes☆55Updated last year
- https://lolad-project.github.io/☆71Updated last month
- BlueBox Malware analysis Box and Cyber threat intelligence.☆40Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆75Updated last year
- Script to test NetSec capabilities.☆21Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- Easy red team phishing with Puppeteer☆127Updated 2 years ago
- ☆158Updated last year
- Updated version of PowerDNS by @domchell. Adds support for transfers over DNS A records and a few other useful features.☆82Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆26Updated 8 months ago