botherder / go-autorunsView external linksLinks
Collect autorun records from running system
☆59Jan 21, 2022Updated 4 years ago
Alternatives and similar repositories for go-autoruns
Users that are interested in go-autoruns are comparing it to the libraries listed below
Sorting:
- Cross-platform Yara scanner written in Go☆328Feb 25, 2023Updated 2 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- Resident (inotify) Anti-Malware Scanner using rules from Linux Malware Detect project☆11Jul 5, 2014Updated 11 years ago
- pcqf (PC Quick Forensics) helps quickly gathering forensic evidence from Windows, Mac, and Linux systems, in order to identify potential …☆135Mar 7, 2023Updated 2 years ago
- Go bindings for YARA☆385Jul 1, 2025Updated 7 months ago
- AutoIt Analysis Library: Parser & Emulator For Malware Researchers☆21Apr 27, 2019Updated 6 years ago
- A mapping of used malware names to commonly known family names☆62Feb 21, 2023Updated 2 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- ☆22Jul 7, 2023Updated 2 years ago
- Klara docker compose☆11May 19, 2020Updated 5 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆107Mar 13, 2018Updated 7 years ago
- 🐳 manage ~18MB go colly crawlers containers w/ different depth ranges, persistence and deploy options☆16Aug 7, 2018Updated 7 years ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Tools for parsing rulesets using the exact grammar as YARA. Written in Go.☆85Dec 21, 2022Updated 3 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- Backdoor detection for VMware view☆13Jan 5, 2022Updated 4 years ago
- The obligatory dotfiles repo.☆14Jan 25, 2026Updated 3 weeks ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 8 years ago
- RadminSavePassword☆14Apr 7, 2020Updated 5 years ago
- This is NOT an Objective-C project. Menet is a TCP-based reverse proxy to help you expose a local server behind a NAT. It can be dynamica…☆17Feb 18, 2023Updated 2 years ago
- Digital Forensics with Kali Linux, published by Packt☆101Jan 30, 2023Updated 3 years ago
- PhishDetect is a library to help identify phishing pages☆108May 11, 2023Updated 2 years ago
- Check Redis instance for security vulnerabilities.☆13Sep 20, 2016Updated 9 years ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Apr 23, 2025Updated 9 months ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- PIC code gen and loading☆13Jul 25, 2017Updated 8 years ago
- Application and service identification rules for Suricata☆19Nov 7, 2022Updated 3 years ago
- Digital Forensics date and time☆23Dec 22, 2025Updated last month
- Invoke-LiveResponse☆150Feb 22, 2022Updated 3 years ago
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆79Feb 4, 2026Updated last week
- ☆15Feb 22, 2021Updated 4 years ago
- Quick tool for using Hybrid Analysis API on command line..☆17Dec 20, 2017Updated 8 years ago
- IronBee Rules☆18Dec 4, 2013Updated 12 years ago
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visit☆29Jan 10, 2026Updated last month
- Better Exploit Code For CVE 2017 9805 apache struts☆20Dec 23, 2017Updated 8 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Dec 19, 2018Updated 7 years ago