elceef / yara-rulz
Collection of generic YARA rules
☆16Updated 10 months ago
Alternatives and similar repositories for yara-rulz:
Users that are interested in yara-rulz are comparing it to the libraries listed below
- ☆34Updated 2 years ago
- ☆18Updated last year
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- ☆14Updated last year
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- ☆33Updated 3 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆21Updated last year
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 2 years ago
- ☆22Updated last year
- Splunk Technology-AddOn for Aurora Sigma-Based EDR Agent. It helps parse and configure the necessary inputs to neatly consume Aurora EDR …☆13Updated 2 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 9 months ago
- ☆26Updated 2 months ago
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- WMI SA stuffs☆29Updated 3 years ago
- Specialized tool to dump Position Independent Code.☆22Updated 4 years ago
- ☆12Updated 2 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆30Updated 2 years ago
- ☆27Updated 5 months ago
- Generates YARA rules to detect malware using API hashing☆17Updated 4 years ago
- Reads and prints information from the website MalAPI.io☆19Updated 2 years ago
- ☆14Updated last year
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆16Updated last year
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated last year
- Collection of Malware Lures☆23Updated 3 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Updated last year
- Repository for LNK stuff☆30Updated 2 years ago