Collection of my own detection rules
☆20Jan 6, 2026Updated last month
Alternatives and similar repositories for detection-rules
Users that are interested in detection-rules are comparing it to the libraries listed below
Sorting:
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- My malware analysis code snippets☆28Jul 15, 2023Updated 2 years ago
- ☆12Aug 16, 2024Updated last year
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。☆16Jun 5, 2025Updated 8 months ago
- Public Chronicle Detection Rules☆12Apr 25, 2023Updated 2 years ago
- ☆15May 3, 2024Updated last year
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆72Jan 6, 2026Updated last month
- ☆13Dec 21, 2023Updated 2 years ago
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Feb 13, 2023Updated 3 years ago
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 10 months ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- version 0.5.8☆17Jul 13, 2021Updated 4 years ago
- ☆20Jan 14, 2026Updated last month
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 8 months ago
- Youtube channel sample code☆55Feb 20, 2026Updated last week
- ☆18Mar 26, 2024Updated last year
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github …☆21Aug 11, 2024Updated last year
- ☆17Jun 14, 2023Updated 2 years ago
- ☆20Nov 28, 2022Updated 3 years ago
- ☆22May 27, 2024Updated last year
- ☆52Oct 29, 2024Updated last year
- Repo containing my public talks☆23May 30, 2023Updated 2 years ago
- ☆18Nov 8, 2025Updated 3 months ago
- BYOVD collection☆24Mar 20, 2024Updated last year
- ☆19Sep 24, 2025Updated 5 months ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆28Feb 15, 2022Updated 4 years ago
- A MBR Fuzzer☆31Apr 3, 2024Updated last year
- aiohttp LFI (CVE-2024-23334)☆27Mar 19, 2024Updated last year
- A simple many-rules to many-files YARA scanner for incident response or malware zoos.☆27Jun 3, 2018Updated 7 years ago
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆277Dec 20, 2025Updated 2 months ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- This repo contains useful scripts that AI created for me which I would have been too lazy for☆92Updated this week
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Jul 14, 2019Updated 6 years ago
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆25Sep 22, 2021Updated 4 years ago
- This is a python version of samesame repo to generate homograph strings☆24Aug 22, 2018Updated 7 years ago
- Renamed to Free EDR to avoid confusion with Comodo's project☆26May 29, 2023Updated 2 years ago
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆157Nov 23, 2025Updated 3 months ago