alt3kx / wafaray
Enhance your malware detection with WAF + YARA (WAFARAY)
☆108Updated 2 years ago
Alternatives and similar repositories for wafaray:
Users that are interested in wafaray are comparing it to the libraries listed below
- ☆57Updated 2 years ago
- Analyzing AD domains for security risks related to user accounts☆63Updated 2 years ago
- C2 Automation using Linode☆80Updated 2 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated last week
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆100Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- Just my findings of malwares☆43Updated 2 years ago
- Detection rule validation☆41Updated last year
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 2 years ago
- Reads and prints information from the website MalAPI.io☆38Updated 3 years ago
- All kinds of tiny shells☆58Updated 2 years ago
- Malware vulnerability intel tool for third-party attackers☆118Updated 6 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 9 months ago
- ☆110Updated 6 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- ☆65Updated 4 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- Script to test NetSec capabilities.☆21Updated 2 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆64Updated last year
- ☆160Updated last year
- ☆119Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆76Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆64Updated 7 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- Search for c2 servers based on netlas☆39Updated last year
- Citrix Scanner for CVE-2023-3519☆51Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- Track C2 servers, tools, and botnets over time by framework and location☆39Updated 3 months ago