darienhuss / dns_sigsView external linksLinks
Create Suricata and Snort DNS signatures given a single domain or list of domains in a file.
☆18Nov 13, 2017Updated 8 years ago
Alternatives and similar repositories for dns_sigs
Users that are interested in dns_sigs are comparing it to the libraries listed below
Sorting:
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- a collection of public yara rules☆25Oct 30, 2019Updated 6 years ago
- Advices to look for malicious software on your devices☆17May 6, 2020Updated 5 years ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 7 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 7 years ago
- Code examples from recent blog posts by minerva labs.☆45Jan 26, 2019Updated 7 years ago
- ☆19Sep 2, 2018Updated 7 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- Censys.io Python API Search☆43May 3, 2017Updated 8 years ago
- A tools to work on suricata stats.log file.☆29Oct 14, 2015Updated 10 years ago
- yara rules for cryptography detection☆30Apr 28, 2014Updated 11 years ago
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- Duitku Payment gateway for PHPNuxBill☆13Aug 23, 2025Updated 5 months ago
- A website and framework for testing NIDS detection☆57Aug 29, 2021Updated 4 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- unicorn emulator for x64dbg☆34Feb 21, 2018Updated 7 years ago
- Start here!☆11Feb 19, 2020Updated 5 years ago
- A few snippets to show how suricata stats can end up in Influx DB using logstash☆12Jul 11, 2016Updated 9 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Mar 24, 2014Updated 11 years ago
- ☆35Dec 9, 2023Updated 2 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆35Mar 5, 2016Updated 9 years ago
- Maltego Transforms, Machines and other extentions☆44Jul 17, 2015Updated 10 years ago
- ☆10Jul 23, 2022Updated 3 years ago
- 🍔⌨ Zom Zom Zomato CLI tool☆10Nov 7, 2017Updated 8 years ago
- Competing Genetic Algorithm to find profitable Trading Strategies on a financial market☆13May 29, 2019Updated 6 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Versioned fork of the OpenCV gem for Ruby☆24Apr 5, 2012Updated 13 years ago
- ☆16Aug 17, 2025Updated 5 months ago
- ☆11Feb 21, 2016Updated 9 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 7 years ago
- A pure Javascript Gantt chart generator, drop in, point, render.☆18Nov 14, 2009Updated 16 years ago
- Run x509lint from a PostgreSQL function☆11Apr 3, 2020Updated 5 years ago
- Non-Alphanumeric JS Obfuscator☆14Aug 22, 2016Updated 9 years ago
- Bluetooth Bluez binding in Crystal☆11Oct 11, 2018Updated 7 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 2 months ago
- A mekko chart☆11Apr 23, 2024Updated last year
- Aplikasi untuk menganalisis log Mikrotik dengan interface modern menggunakan EJS, Express, Element UI, dan Alpine.js.☆27Nov 8, 2025Updated 3 months ago