Create Suricata and Snort DNS signatures given a single domain or list of domains in a file.
☆18Nov 13, 2017Updated 8 years ago
Alternatives and similar repositories for dns_sigs
Users that are interested in dns_sigs are comparing it to the libraries listed below
Sorting:
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- a collection of public yara rules☆25Oct 30, 2019Updated 6 years ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 7 years ago
- Code examples from recent blog posts by minerva labs.☆45Jan 26, 2019Updated 7 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- ☆19Sep 2, 2018Updated 7 years ago
- Censys.io Python API Search☆43May 3, 2017Updated 8 years ago
- A tools to work on suricata stats.log file.☆29Oct 14, 2015Updated 10 years ago
- yara rules for cryptography detection☆31Apr 28, 2014Updated 11 years ago
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- Duitku Payment gateway for PHPNuxBill☆12Aug 23, 2025Updated 6 months ago
- Quickly generate suricata rules for IOCs☆28Apr 30, 2021Updated 4 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- unicorn emulator for x64dbg☆34Feb 21, 2018Updated 8 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Mar 24, 2014Updated 11 years ago
- This is a bash script used for ISPConfig 3 server migrations☆15Sep 13, 2016Updated 9 years ago
- Samsung Galaxy A52s 5G (a52sxq) TWRP Device Tree.☆12Jan 27, 2024Updated 2 years ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- Start here!☆11Feb 19, 2020Updated 6 years ago
- A few snippets to show how suricata stats can end up in Influx DB using logstash☆12Jul 11, 2016Updated 9 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆35Mar 5, 2016Updated 10 years ago
- Maltego Transforms, Machines and other extentions☆45Jul 17, 2015Updated 10 years ago
- Fathimah bot Telegram support plugins.☆13Aug 19, 2017Updated 8 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Run x509lint from a PostgreSQL function☆11Apr 3, 2020Updated 5 years ago
- Vector Tree Ring Generator for Pen Plotting☆12Oct 16, 2023Updated 2 years ago
- Non-Alphanumeric JS Obfuscator☆14Aug 22, 2016Updated 9 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- Website for The State of FOSS in India report.☆10Aug 20, 2021Updated 4 years ago
- 🍔⌨ Zom Zom Zomato CLI tool☆10Nov 7, 2017Updated 8 years ago
- ☆11Feb 21, 2016Updated 10 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated last month
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Versioned fork of the OpenCV gem for Ruby☆24Apr 5, 2012Updated 13 years ago
- ☆10Jul 23, 2022Updated 3 years ago
- CGNAT em dispositivos baseados em RouterOS☆12May 14, 2019Updated 6 years ago
- A pure Javascript Gantt chart generator, drop in, point, render.☆18Nov 14, 2009Updated 16 years ago