erdemkm / zeekYaraScannerView external linksLinks
Scan extracted file from Zeek with Yara rules and get statistical analysis for matching files. Optionally, simulate matching malicious files with Picus.
☆15Dec 18, 2023Updated 2 years ago
Alternatives and similar repositories for zeekYaraScanner
Users that are interested in zeekYaraScanner are comparing it to the libraries listed below
Sorting:
- ☆10Jul 8, 2024Updated last year
- Linux System Programming - Kernel Modules, Device Drivers, Proc File System etc.☆13Dec 30, 2016Updated 9 years ago
- ☆13Jun 14, 2024Updated last year
- Social Limiter google extension☆12Mar 4, 2022Updated 3 years ago
- View pe coff files with browsers.☆17May 14, 2020Updated 5 years ago
- Basic information about ES6 yield and es7 async function syntax. Unfortunately It is turkish :(☆18Sep 14, 2018Updated 7 years ago
- ⚠️ Malware Development training ⚠️☆40Feb 24, 2025Updated 11 months ago
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆39May 20, 2024Updated last year
- BIXI is a fast, stable, and powerful DDoS tool designed for efficiency. It supports multiple protocols including TCP, UDP, ICMP, HTTP, an…☆10Apr 9, 2025Updated 10 months ago
- Open source knight online server typescript implementation☆34Jun 30, 2025Updated 7 months ago
- ☆49Jan 14, 2025Updated last year
- Restful ssh service for stupid company rules.☆10Nov 3, 2020Updated 5 years ago
- This repository will contain source codes from the Tradecraft improvement blog series☆14Mar 27, 2025Updated 10 months ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- CVE-2025-55182-bypass-waf☆30Jan 8, 2026Updated last month
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- ☆10Nov 15, 2025Updated 3 months ago
- ☆10Aug 11, 2025Updated 6 months ago
- ☆23Jun 28, 2025Updated 7 months ago
- CVE-2023-23192☆13Mar 27, 2023Updated 2 years ago
- My angular 4 notes. It may help you to give a shot too :)☆39Nov 15, 2017Updated 8 years ago
- PISI package manager of Pardus linux written in Python. The original development branch by the main author.☆41Jan 4, 2023Updated 3 years ago
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago
- serdivan is attribute based grid system, not just belediye.☆12Apr 21, 2021Updated 4 years ago
- [DEPRECATED] An Ingress controller for Kubernetes using the Azure Application Gateway L7 router/load balancer to perform ingress.☆19Mar 28, 2023Updated 2 years ago
- ☆13Mar 23, 2023Updated 2 years ago
- A comprehensive WiFi penetration testing framework for security professionals☆16Jul 18, 2025Updated 6 months ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- Collect XSS vulnerable parameters from entire domain.☆13Jul 29, 2022Updated 3 years ago
- simple script to solve the problem of internet connection after ParrotOS-Anonsurf☆15Apr 2, 2022Updated 3 years ago
- ☆10Aug 14, 2023Updated 2 years ago
- Implementation for - Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters sketches☆13Oct 9, 2019Updated 6 years ago
- İyi ki doğdun be! :)☆46Aug 29, 2017Updated 8 years ago
- Operator charm for MongoDB on Kubernetes☆13Updated this week
- ☆13Jan 19, 2023Updated 3 years ago
- Pinger is a tool to ping the ip addresses in files such as excel or csv to show if the hosts are turned on.☆12Feb 9, 2020Updated 6 years ago
- Resources to accelerate deployment of bots to aide with an influx of COVID related questions☆16May 20, 2020Updated 5 years ago
- ExcelLabs is an Excel Helper library written in C#.☆12Jun 11, 2024Updated last year
- 📋 Guide to regular commit messages☆11Dec 24, 2024Updated last year