☆35Jan 13, 2026Updated last month
Alternatives and similar repositories for blog-scripts
Users that are interested in blog-scripts are comparing it to the libraries listed below
Sorting:
- Configuration Extractors for Malware☆124Apr 23, 2025Updated 10 months ago
- Python Library for ConfigExtractor☆15Updated this week
- IDA Python scripts☆42Apr 11, 2025Updated 10 months ago
- Resources from Trend Micro Research teams☆26Nov 14, 2024Updated last year
- Unpacker and Config Extractor for managed Redline Stealer payloads☆42Feb 18, 2023Updated 3 years ago
- ☆27Nov 26, 2024Updated last year
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.☆12Jun 9, 2025Updated 8 months ago
- Collection of generic YARA rules☆16Aug 17, 2025Updated 6 months ago
- A Framework to Automatically Extract Indicators of Compromise (IoCs) from Twitter☆16Dec 9, 2019Updated 6 years ago
- Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.☆13Nov 10, 2023Updated 2 years ago
- This repo contains the APK to follow along with my "Beautifying Android Native Code" Video on Youtube☆13May 31, 2023Updated 2 years ago
- Writeup on how to access Wifi pineapple GUI through non-management APs and fuzz web app login credentials☆15Dec 1, 2021Updated 4 years ago
- Archive of leaked Equation Group materials☆21Aug 17, 2016Updated 9 years ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated last year
- ☆23Mar 17, 2024Updated last year
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- Pure python parser for Snort/Suricata rules.☆33Mar 13, 2024Updated last year
- ☆20Jan 14, 2026Updated last month
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 8 months ago
- ☆127Updated this week
- Muteces (mutexes/mutants) used by various malware families☆23Nov 11, 2024Updated last year
- KoiVM,EazVM,AgileVM Patcher Por "Team Venturi77"☆18Aug 16, 2019Updated 6 years ago
- Yara Rules for Modern Malware☆78Mar 3, 2024Updated last year
- ☆21Apr 19, 2024Updated last year
- sl0ppy-PrivescTaskCreator.ps1☆40Oct 8, 2025Updated 4 months ago
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆37Feb 6, 2026Updated 3 weeks ago
- URL fingerprinting made easy☆89Apr 13, 2024Updated last year
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Feb 24, 2023Updated 3 years ago
- Collection of my own detection rules☆20Jan 6, 2026Updated last month
- Contains pixel exclusives, fix and tweaks to boost user experience on devices running Android 9/10☆21Apr 3, 2020Updated 5 years ago
- Open-source Fabric templates for cybersecurity and compliance☆31Jan 13, 2025Updated last year
- ☆22Dec 22, 2020Updated 5 years ago
- High Octane Triage Analysis☆817Feb 22, 2026Updated last week
- Malware Configuration Extraction Modules☆51Nov 25, 2023Updated 2 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- Extract AutoIt scripts embedded in PE binaries☆216Jul 15, 2024Updated last year
- A static String Decryptor Based Off Instruction Emulator☆23Oct 14, 2018Updated 7 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Feb 15, 2022Updated 4 years ago