Enhance your malware detection with WAF + YARA (WAFARAY)
☆108Sep 29, 2022Updated 3 years ago
Alternatives and similar repositories for wafaray
Users that are interested in wafaray are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- ☆19Oct 2, 2022Updated 3 years ago
- Extract C2 Traffic☆254Nov 25, 2024Updated last year
- Infect Shared Files In Memory for Lateral Movement☆192Dec 14, 2022Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆159Nov 26, 2023Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆23Nov 22, 2021Updated 4 years ago
- the Open Source and Pure C++ Packer for eXecutables☆21Mar 25, 2023Updated 3 years ago
- Visually inspect and force decode YARA and regex matches found in both binary and text data with colors. Lots of colors.☆148Feb 1, 2026Updated 2 months ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆86Jan 6, 2023Updated 3 years ago
- Random scripts for azure stuff☆14Oct 12, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 🌒 Shell command obfuscation to avoid detection systems☆122Oct 10, 2022Updated 3 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Jun 22, 2024Updated last year
- Redeye is a tool intended to help you manage your data during a pentest operation☆473Aug 21, 2024Updated last year
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- ☆70Oct 30, 2023Updated 2 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆255Oct 29, 2025Updated 5 months ago
- Linux startup analyzer☆66Jun 2, 2025Updated 10 months ago
- Spring Framework RCE (Quick pentest notes)☆17Apr 7, 2022Updated 4 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆46Jan 2, 2022Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Rapidly Search and Hunt through Linux Forensics Artifacts☆202Mar 9, 2026Updated last month
- My experiments in weaponizing Nim (https://nim-lang.org/)☆17Mar 1, 2023Updated 3 years ago
- Roast in the Middle☆294Sep 19, 2025Updated 6 months ago
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆98Jan 13, 2026Updated 3 months ago
- Shodan Monitoring integration for TheHive.☆130Dec 12, 2024Updated last year
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Nov 8, 2023Updated 2 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆254Nov 18, 2024Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆373Apr 6, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Feb 3, 2022Updated 4 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Feb 15, 2022Updated 4 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Sep 15, 2022Updated 3 years ago
- Yet Another Memory Analyzer for malware detection☆205Apr 8, 2025Updated last year
- ☆12Jun 22, 2022Updated 3 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Sep 4, 2023Updated 2 years ago