Enhance your malware detection with WAF + YARA (WAFARAY)
☆108Sep 29, 2022Updated 3 years ago
Alternatives and similar repositories for wafaray
Users that are interested in wafaray are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- ☆19Oct 2, 2022Updated 3 years ago
- Extract C2 Traffic☆254Nov 25, 2024Updated last year
- Infect Shared Files In Memory for Lateral Movement☆191Dec 14, 2022Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆52Nov 8, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆159Nov 26, 2023Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- A python script which allows you to parse GeoLocation data from your Image files stored in a dataset.It also produces output in CSV file …☆43Dec 20, 2020Updated 5 years ago
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆23Nov 22, 2021Updated 4 years ago
- the Open Source and Pure C++ Packer for eXecutables☆21Mar 25, 2023Updated 3 years ago
- Visually inspect and force decode YARA and regex matches found in both binary and text data with colors. Lots of colors.☆148Feb 1, 2026Updated 3 months ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆86Jan 6, 2023Updated 3 years ago
- Random scripts for azure stuff☆14Oct 12, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 🌒 Shell command obfuscation to avoid detection systems☆122Oct 10, 2022Updated 3 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Jun 22, 2024Updated last year
- Redeye is a tool intended to help you manage your data during a pentest operation☆473Aug 21, 2024Updated last year
- Imphash-like calculation on Golang binaries☆50Jul 2, 2022Updated 3 years ago
- ☆70Oct 30, 2023Updated 2 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆256Oct 29, 2025Updated 6 months ago
- Linux startup analyzer☆66Jun 2, 2025Updated 11 months ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆47Jan 2, 2022Updated 4 years ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆209Mar 9, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- My experiments in weaponizing Nim (https://nim-lang.org/)☆17Mar 1, 2023Updated 3 years ago
- Roast in the Middle☆294Sep 19, 2025Updated 7 months ago
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆100Jan 13, 2026Updated 3 months ago
- Shodan Monitoring integration for TheHive.☆130Dec 12, 2024Updated last year
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Nov 8, 2023Updated 2 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆254Nov 18, 2024Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆375Apr 6, 2024Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Feb 3, 2022Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated 2 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Feb 15, 2022Updated 4 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Sep 15, 2022Updated 3 years ago
- Yet Another Memory Analyzer for malware detection☆205Apr 8, 2025Updated last year
- ☆12Jun 22, 2022Updated 3 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Sep 4, 2023Updated 2 years ago
- Monarch - The Adversary Emulation Toolkit☆64Jan 7, 2025Updated last year