Community Detection Signature Build and Distribution Pipeline for YARA, Suricata, Snort and Sigma
☆27Jun 20, 2023Updated 2 years ago
Alternatives and similar repositories for signatures
Users that are interested in signatures are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Aug 5, 2021Updated 4 years ago
- Command-line tool to search for malware samples in various repositories☆13Mar 3, 2022Updated 4 years ago
- OLE Package Format Documentation☆23Jun 13, 2020Updated 5 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- apache solr 5.x - 8.2.0 rce (with config api)☆11Oct 31, 2019Updated 6 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Dec 26, 2023Updated 2 years ago
- Myrmidex split ergo keyboard with two encoders☆14Dec 19, 2021Updated 4 years ago
- aggregated repo for all conferences and talks I am giving☆17Oct 30, 2021Updated 4 years ago
- ☆26Jan 10, 2019Updated 7 years ago
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆17Oct 28, 2023Updated 2 years ago
- ☆23Jan 9, 2019Updated 7 years ago
- 存储iot设备分析工具和分析文件☆14May 28, 2021Updated 4 years ago
- Tool to display a Windows 8+ process mitigation policy☆12Jul 9, 2025Updated 10 months ago
- Code snips and notes☆142Mar 10, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This is creating a TCP Server using Rust programming language☆14Oct 3, 2023Updated 2 years ago
- Turn any blog into structured threat intelligence.☆57Updated this week
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Apr 14, 2023Updated 3 years ago
- A ready-made template for a project based on libpeconv.☆53Apr 18, 2026Updated 3 weeks ago
- ☆37Jan 15, 2022Updated 4 years ago
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- “Intelliroot Code Injection Hunter” is a tool that can to help you identify injected malicious code. The tool can identify and extract po…☆16Sep 21, 2022Updated 3 years ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- Scripts and lists to help generate YARA friendly string mutations☆22Apr 9, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- The ultimate Red Team toolkit for phishing operations.☆54Apr 29, 2026Updated last week
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆15Jul 1, 2020Updated 5 years ago
- Assortment of hashing algorithms used in malware☆397Feb 8, 2026Updated 3 months ago
- ☆21Feb 6, 2024Updated 2 years ago
- ☆77Nov 30, 2023Updated 2 years ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- IDAPython scripts☆15Aug 24, 2017Updated 8 years ago
- ☆22May 29, 2025Updated 11 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Research notes☆134Apr 14, 2026Updated 3 weeks ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- ☆41Dec 30, 2025Updated 4 months ago
- Bluetooth LE Keyboard library for the ESP32C3 (Arduino IDE compatible)☆21Jul 9, 2023Updated 2 years ago
- Disable threat tracing from the kernel..☆15Apr 8, 2022Updated 4 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- The Geospatial Analysis Integrity Tool (GAIT) validates data against a data model. GAIT checks geometry, feature codes, attribute values …☆13Apr 23, 2018Updated 8 years ago