eset / yaraLinks
The pattern matching swiss knife
☆15Updated 5 years ago
Alternatives and similar repositories for yara
Users that are interested in yara are comparing it to the libraries listed below
Sorting:
- Decrypts Cisco VPN Group Passwords☆18Updated 13 years ago
- ☆70Updated 6 years ago
- Dependencies for Veil 3☆17Updated 8 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Dragon Sandbox☆79Updated 12 years ago
- Open Standard Vulnerability & Compliance Scanner☆45Updated 9 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- Mass malicious script dump/Malware src dump☆16Updated 8 years ago
- A Passive DNS backend and collector☆31Updated 3 years ago
- ☆54Updated 8 months ago
- ☆65Updated 8 years ago
- A simple AES malware crypter☆16Updated 7 years ago
- Openssh backdoor found with a ssh honeypot☆28Updated 9 years ago
- This is a python version of samesame repo to generate homograph strings☆24Updated 7 years ago
- Blocks drivers from loading by using a name collision technique. #nsacyber☆50Updated 7 years ago
- ☆12Updated 8 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆61Updated 12 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago
- Some of the vulnerabilities that were found by Cybellum platform☆33Updated 7 years ago
- Talos Decryptor POC for Remcos RAT version 2.0.5 and earlier☆24Updated 7 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 6 years ago
- pure Python binary analysis framework☆23Updated 6 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 8 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- ☆26Updated 8 years ago
- Archive of leaked Equation Group materials☆16Updated 9 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Updated 10 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- A Unix rootkit☆17Updated 5 years ago