eset / yara
The pattern matching swiss knife
☆15Updated 5 years ago
Alternatives and similar repositories for yara:
Users that are interested in yara are comparing it to the libraries listed below
- Automatic generator of YARA modules based in protocol buffers☆16Updated 3 weeks ago
- Decrypts Cisco VPN Group Passwords☆17Updated 13 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Updated 7 months ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- ☆16Updated 2 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆15Updated 11 years ago
- Autopsy plugin to extract information from the 'Your Phone' Windows 10 App☆13Updated 4 years ago
- Dump Windows registry hives as text.☆16Updated 6 years ago
- A curated list of awesome malware analysis tools and resources☆15Updated 6 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- Simplified NAT Slipstream server and client☆20Updated 4 years ago
- 🦅 Falcon Malware Sandbox APIv2 Connector☆29Updated last year
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago
- ☆69Updated 6 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆9Updated 5 years ago
- Various Crypter Project☆9Updated 10 years ago
- AutoIt Analysis Library: Parser & Emulator For Malware Researchers☆20Updated 5 years ago
- Source distribution of the Ghidra software reverse engineering (SRE) framework https://www.nsa.gov/ghidra☆9Updated 5 years ago
- ARP Man-in-the-Middle tool☆28Updated 2 months ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- Blocks drivers from loading by using a name collision technique. #nsacyber☆45Updated 7 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 7 years ago
- Generate CIA/NSA style project codenames☆22Updated 7 years ago
- My solutions for random crackmes and other challenges☆11Updated 5 years ago
- Open Standard Vulnerability & Compliance Scanner☆43Updated 9 years ago
- xlrd2 is a variant of xlrd that is actively maintained☆23Updated 6 months ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago