eset / yara
The pattern matching swiss knife
☆15Updated 5 years ago
Alternatives and similar repositories for yara:
Users that are interested in yara are comparing it to the libraries listed below
- Decrypts Cisco VPN Group Passwords☆17Updated 13 years ago
- Source distribution of the Ghidra software reverse engineering (SRE) framework https://www.nsa.gov/ghidra☆9Updated 6 years ago
- ☆16Updated 2 years ago
- This repository contains various shell scripts and tips and tricks used for packaging androidtamer packages☆11Updated 2 years ago
- Blocks drivers from loading by using a name collision technique. #nsacyber☆49Updated 7 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- All TMF files that I extracted from Microsoft PDBs.☆12Updated 5 years ago
- A simple, lightweight Remote Access Tool written in Python☆17Updated 6 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- Various Crypter Project☆9Updated 11 years ago
- module for certexfil☆15Updated 2 years ago
- Simplified NAT Slipstream server and client☆20Updated 4 years ago
- Automatic generator of YARA modules based in protocol buffers☆16Updated 2 months ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- Notes about reverse engineering the Petya2017 ransomware☆18Updated 7 years ago
- Dependencies for Veil 3☆18Updated 8 years ago
- Autopsy plugin to extract information from the 'Your Phone' Windows 10 App☆13Updated 4 years ago
- Automated encryption utilities and installation☆12Updated 4 years ago
- Game Hacking Adventures Scripts & Tools☆20Updated 12 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- xlrd2 is a variant of xlrd that is actively maintained☆23Updated 8 months ago
- Finder Predator The Thief botnet panel☆7Updated 5 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆9Updated 5 years ago
- Simple windows backdoor command shell.☆21Updated 7 years ago
- A Unix rootkit☆16Updated 4 years ago
- Collection of cracked malware☆14Updated 6 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago
- Empire is a pure PowerShell post-exploitation agent.☆11Updated 8 years ago