eset / yaraLinks
The pattern matching swiss knife
☆16Updated 6 years ago
Alternatives and similar repositories for yara
Users that are interested in yara are comparing it to the libraries listed below
Sorting:
- Dependencies for Veil 3☆17Updated 8 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆25Updated 7 years ago
- Blocks drivers from loading by using a name collision technique. #nsacyber☆50Updated 8 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
- ☆56Updated this week
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 11 years ago
- Simple windows backdoor command shell.☆20Updated 8 years ago
- Dragon Sandbox☆79Updated 12 years ago
- My metasploit modules☆24Updated 9 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27Updated 9 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Updated 13 years ago
- Open Standard Vulnerability & Compliance Scanner☆46Updated 10 years ago
- ☆70Updated 7 years ago
- Decrypts Cisco VPN Group Passwords☆18Updated 13 years ago
- Cockroach is your primitive & immortal swiss army knife.☆49Updated 4 years ago
- Simplified NAT Slipstream server and client☆22Updated 5 years ago
- pure Python binary analysis framework☆23Updated 7 years ago
- A curated list of awesome malware analysis tools and resources☆15Updated 7 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated 5 years ago
- 🔵 ethereum grid trading bot☆35Updated 2 months ago
- ☆65Updated 9 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆13Updated 8 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 12 years ago
- ☆24Updated 6 years ago
- Service for management of hosts where is present a malware developed using Richkware framework.☆18Updated last year
- ☆32Updated last year
- Various Crypter Project☆10Updated 11 years ago
- Cryptographic Dataset Generation & Modelling Framework☆40Updated 5 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 9 years ago
- Created by Jeffrey Martin via the GitHub Connector☆26Updated 10 months ago