cocaman / yara-scan-serviceView external linksLinks
Repository for scripts and tips for "Yara Scan Service"
☆20Feb 19, 2023Updated 2 years ago
Alternatives and similar repositories for yara-scan-service
Users that are interested in yara-scan-service are comparing it to the libraries listed below
Sorting:
- ☆11Apr 25, 2021Updated 4 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 5 years ago
- Notes for High Availability MISP in AWS☆19Nov 6, 2019Updated 6 years ago
- YARI is an interactive debugger for YARA Language.☆89Sep 10, 2025Updated 5 months ago
- ☆16Apr 30, 2024Updated last year
- Client library for the mwdb service by CERT Polska.☆42Feb 10, 2026Updated last week
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆41Jan 31, 2025Updated last year
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Cyber Underground General Intelligence Requirements☆97Feb 2, 2024Updated 2 years ago
- Alternative YARA scanning engine☆73Aug 23, 2022Updated 3 years ago
- ☆23Jun 1, 2023Updated 2 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 3 years ago
- Tools for preservation of floppy disks☆11Nov 22, 2025Updated 2 months ago
- ☆12Feb 24, 2023Updated 2 years ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Summarize CTI reports with OpenAI☆18Feb 9, 2026Updated last week
- ☆11Dec 22, 2020Updated 5 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- Yara filetype plugin for Vim.☆14Feb 18, 2021Updated 4 years ago
- SecuritySnack data that doesn't fit into a single tweet.☆43Dec 22, 2025Updated last month
- ☆12Dec 23, 2021Updated 4 years ago
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆15Sep 23, 2025Updated 4 months ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Sep 21, 2025Updated 4 months ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- Python scripts for Malware Bazaar☆157Jun 3, 2024Updated last year
- MSTIC Notebook Components☆35Sep 4, 2025Updated 5 months ago
- misp-guard is a mitmproxy addon that inspects and blocks outgoing events to external MISP instances via sync mechanisms (pull/push) based…☆19Jan 9, 2026Updated last month
- CISOinaBox is a free community framework to organize tools, templates, and resources to help equip new CISOs and set them up for success.…☆31Dec 30, 2025Updated last month
- ☆23Mar 17, 2024Updated last year
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Nov 18, 2024Updated last year