Collection of my own detection rules
☆20Jan 6, 2026Updated 4 months ago
Alternatives and similar repositories for detection-rules
Users that are interested in detection-rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Aug 16, 2024Updated last year
- My malware analysis code snippets☆28Jul 15, 2023Updated 2 years ago
- ☆23Dec 15, 2022Updated 3 years ago
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆28Jan 5, 2026Updated 4 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A repository to store community malware research notes and findings.☆15Feb 13, 2026Updated 3 months ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 3 years ago
- UnpacMe IDA Byte Search☆29Nov 20, 2023Updated 2 years ago
- ☆16May 3, 2024Updated 2 years ago
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。☆16Jun 5, 2025Updated 11 months ago
- ☆20Jan 14, 2026Updated 4 months ago
- ☆18Mar 26, 2024Updated 2 years ago
- version 0.5.8☆18Jul 13, 2021Updated 4 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Jul 14, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Public Chronicle Detection Rules☆12Apr 25, 2023Updated 3 years ago
- Simple GUI app to simplify manual string decryption with de4dot☆26Jan 25, 2022Updated 4 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- ☆13Dec 21, 2023Updated 2 years ago
- BlackHat Asia 2025 code and presentations☆17Apr 13, 2025Updated last year
- XOrCryptEx lightweight C Utility/Algorithm☆13Mar 3, 2022Updated 4 years ago
- Work In Progress☆10Jul 10, 2024Updated last year
- Malware Configuration Extraction Modules☆50Nov 25, 2023Updated 2 years ago
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆40Apr 24, 2026Updated 3 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆25Sep 22, 2021Updated 4 years ago
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆207Mar 30, 2026Updated last month
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆126Jul 12, 2024Updated last year
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Rules shared by the community from 100 Days of YARA 2024☆90Jan 1, 2025Updated last year
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- Windows 10/11 unsigned kernel driver load/debugging☆20Feb 17, 2023Updated 3 years ago
- FAUCET is an OpenFlow controller for multi table OpenFlow 1.3 switches, that implements layer 2 switching, VLANs, ACLs, and layer 3 IPv4 …☆14Nov 18, 2019Updated 6 years ago
- Zerokit shared code☆18Mar 28, 2019Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- DUQU MALWARE SOURCE + BINARY + More coming☆14Feb 6, 2023Updated 3 years ago
- ☆13Sep 22, 2022Updated 3 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- UEFI bootkit: Hardware Implant. In-Progress☆15Mar 7, 2022Updated 4 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆131Nov 25, 2023Updated 2 years ago
- an iSCSI demo driver for Windows☆12Sep 21, 2015Updated 10 years ago