Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"
☆17Feb 6, 2025Updated last year
Alternatives and similar repositories for siglearn
Users that are interested in siglearn are comparing it to the libraries listed below
Sorting:
- A simple way of detecting multithreaded exfiltration in Zeek.☆15May 1, 2025Updated 10 months ago
- Vovk is framework of tools that include a WinDbg extension that generates in-depth YARA rules for malware.☆24Aug 26, 2024Updated last year
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆26Oct 20, 2022Updated 3 years ago
- Automatic generation of YARA rules from sample files.☆28Apr 10, 2025Updated 10 months ago
- Releases for the Zui Insiders app.☆22Feb 17, 2025Updated last year
- Detect kerberos attacks in pcap files☆29Dec 13, 2015Updated 10 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆34Feb 2, 2026Updated last month
- ☆33Feb 26, 2022Updated 4 years ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆33May 25, 2024Updated last year
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆32Sep 16, 2024Updated last year
- [READ ONLY] Subtree split of the siyuan-packages-monorepo (see https://github.com/Zuoqiu-Yingyi/siyuan-packages-monorepo)☆12Jan 23, 2024Updated 2 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 4 years ago
- StreamlitとLangGraphで実装したHuman-in-the-loop広告コピー文生成アプリケーション☆11Feb 15, 2025Updated last year
- GhidraQuark bridges Quark Engine into Ghidra☆39Mar 9, 2021Updated 4 years ago
- MinIO nodes for n8n☆11Feb 2, 2026Updated last month
- ☆11Dec 5, 2022Updated 3 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆39Aug 18, 2022Updated 3 years ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- ⚡ Developer-friendly hybrid-RAG toolkit merging Graphiti, Qdrant, mem0, LlamaIndex, and LangChain into one powerful engine.☆15Jan 14, 2026Updated last month
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- Set of scripts to index PCAP files and retrieve packets☆14Sep 10, 2015Updated 10 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- Cyber Security Challenge Australia 2014 Files☆18May 9, 2014Updated 11 years ago
- 🔒 A Node.js ransomware implementation.☆11Jun 17, 2021Updated 4 years ago
- TCP/HTTP packet sniffer in Go☆13Jul 11, 2025Updated 7 months ago
- ☆12Dec 15, 2024Updated last year
- a scanner for scan website's directories and files☆12Oct 15, 2017Updated 8 years ago
- ☆14Jun 1, 2023Updated 2 years ago
- A set of tools to organize, archive and distribute data files.☆16Jan 28, 2026Updated last month
- ☆11Nov 14, 2024Updated last year
- Smokeping SSH Probe for Mikrotik RouterOS☆16Jan 11, 2026Updated last month
- ☆12Feb 8, 2023Updated 3 years ago
- Code for intro to DSPy blog post☆29Oct 13, 2025Updated 4 months ago
- ☆13Apr 8, 2022Updated 3 years ago
- Community-based CybergON-powered Suricata rules☆12Jul 5, 2022Updated 3 years ago
- Yet Another Fake Honeypot written in Go☆10Dec 8, 2017Updated 8 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Poshito is a Windows C2 over Telegram☆21Oct 30, 2024Updated last year
- Simple tool to monitor network changes over time and trigger alerts☆15Mar 11, 2020Updated 5 years ago