Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"
☆17Feb 6, 2025Updated last year
Alternatives and similar repositories for siglearn
Users that are interested in siglearn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆26Oct 20, 2022Updated 3 years ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- An extension of the sigma standard to include security metrics.☆16May 18, 2023Updated 2 years ago
- Some resources to facilitate my blog on auditd for security monitoring☆13Mar 23, 2023Updated 3 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Apr 21, 2020Updated 5 years ago
- WAF Environment for OpenAI Gym☆15Dec 13, 2020Updated 5 years ago
- A simple way of detecting multithreaded exfiltration in Zeek.☆15May 1, 2025Updated 10 months ago
- Collection of tools to build and run a distributed spamtrap system, consisting of IMAP and SMTP collectors and a backend that extracts at…☆12Oct 23, 2023Updated 2 years ago
- Automatic generation of YARA rules from sample files.☆28Apr 10, 2025Updated 11 months ago
- Dumps all resources from a PE file (EXE, DLL, ...)☆11Jan 13, 2019Updated 7 years ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- Fixes and patches☆20Dec 3, 2020Updated 5 years ago
- This is a clone of an SVN repository at http://svn.code.sf.net/p/pyparsing/code. It had been cloned by http://svn2github.com/ , but the s…☆11Apr 23, 2017Updated 8 years ago
- Lightweight, secure and login like console display manager for X☆16Nov 1, 2021Updated 4 years ago
- This gym environment simulates network intrusion similar to that described in the NSL-KDD Dataset given in this link http://www.unb.ca/ci…☆14Feb 15, 2018Updated 8 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- LD_PRELOAD Linux rootkit (x86 & ARM)☆26Apr 8, 2019Updated 6 years ago
- A collection of utilities to help with analysis on the command line.☆18Aug 9, 2024Updated last year
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆34Feb 2, 2026Updated last month
- ☆16Mar 16, 2021Updated 5 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- web安全机器学习入门☆13Jan 9, 2019Updated 7 years ago
- Hunt for SQLite files used by various applications☆30Mar 1, 2026Updated 3 weeks ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆11Mar 12, 2026Updated last week
- PerchLabs threat feed☆16Aug 23, 2021Updated 4 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Jun 28, 2023Updated 2 years ago
- RevEng.AI Radare2 Plugin☆17Jul 13, 2025Updated 8 months ago
- golang版的dsinff-webspy☆27Dec 14, 2017Updated 8 years ago
- A little joke Blue Screen of Death simulator (BSOD) for the Game Boy - now with LEDs!☆13Aug 11, 2024Updated last year
- Event Log Analysis Tools☆31Sep 27, 2016Updated 9 years ago
- ☆13Apr 8, 2022Updated 3 years ago
- Inlay hints for hex-rays☆82Jan 17, 2026Updated 2 months ago
- Meme Driven Development (MDD) - A novel (and fun) approach to modern software development☆14Mar 16, 2026Updated last week
- A tool to extract RTTI information from Delphi executables, written in pure Python☆23Mar 11, 2020Updated 6 years ago
- 企业级安全智能化实践☆70Mar 16, 2022Updated 4 years ago
- A library for interacting with Windows through SMB written in Nim.☆17Sep 14, 2025Updated 6 months ago
- This is a concept poc of command and control server implemented over blockchain☆56Aug 13, 2019Updated 6 years ago