Collect autorun records from running system
☆60Jan 21, 2022Updated 4 years ago
Alternatives and similar repositories for go-autoruns
Users that are interested in go-autoruns are comparing it to the libraries listed below
Sorting:
- Cross-platform Yara scanner written in Go☆328Feb 25, 2023Updated 3 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- Resident (inotify) Anti-Malware Scanner using rules from Linux Malware Detect project☆11Jul 5, 2014Updated 11 years ago
- pcqf (PC Quick Forensics) helps quickly gathering forensic evidence from Windows, Mac, and Linux systems, in order to identify potential …☆135Mar 7, 2023Updated 3 years ago
- Go bindings for YARA☆387Jul 1, 2025Updated 8 months ago
- AutoIt Analysis Library: Parser & Emulator For Malware Researchers☆21Apr 27, 2019Updated 6 years ago
- Collection of scripts used to analyse malware or emails☆20Oct 6, 2020Updated 5 years ago
- A mapping of used malware names to commonly known family names☆62Feb 21, 2023Updated 3 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- ☆23Jul 7, 2023Updated 2 years ago
- Klara docker compose☆11May 19, 2020Updated 5 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆108Mar 13, 2018Updated 7 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- 🐳 manage ~18MB go colly crawlers containers w/ different depth ranges, persistence and deploy options☆16Aug 7, 2018Updated 7 years ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- Tools for parsing rulesets using the exact grammar as YARA. Written in Go.☆85Dec 21, 2022Updated 3 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- Backdoor detection for VMware view☆13Jan 5, 2022Updated 4 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- The obligatory dotfiles repo.☆14Jan 25, 2026Updated last month
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- RadminSavePassword☆14Apr 7, 2020Updated 5 years ago
- OSSEM Data Dictionaries☆65Jan 22, 2025Updated last year
- PhishDetect is a library to help identify phishing pages☆108May 11, 2023Updated 2 years ago
- PIC code gen and loading☆13Jul 25, 2017Updated 8 years ago
- It is a repository for Red Team emulation based on MITRE ATT&CK.☆16Aug 5, 2019Updated 6 years ago
- Check Redis instance for security vulnerabilities.☆13Sep 20, 2016Updated 9 years ago
- Digital Forensics date and time☆23Dec 22, 2025Updated 2 months ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Application and service identification rules for Suricata☆19Nov 7, 2022Updated 3 years ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Apr 23, 2025Updated 10 months ago
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- Quick tool for using Hybrid Analysis API on command line..☆17Dec 20, 2017Updated 8 years ago
- Repository containing malware analysis filters for the Windows SysInternals' - Process Monitor tool☆20Oct 2, 2020Updated 5 years ago
- ☆15Feb 22, 2021Updated 5 years ago
- Better Exploit Code For CVE 2017 9805 apache struts☆20Dec 23, 2017Updated 8 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visit☆29Jan 10, 2026Updated last month