eset / yaraLinks
The pattern matching swiss knife
☆15Updated 5 years ago
Alternatives and similar repositories for yara
Users that are interested in yara are comparing it to the libraries listed below
Sorting:
- Decrypts Cisco VPN Group Passwords☆17Updated 13 years ago
- Source distribution of the Ghidra software reverse engineering (SRE) framework https://www.nsa.gov/ghidra☆9Updated 6 years ago
- Simplified NAT Slipstream server and client☆21Updated 4 years ago
- ☆16Updated 2 years ago
- This repository contains various shell scripts and tips and tricks used for packaging androidtamer packages☆11Updated 2 years ago
- ☆53Updated 4 months ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- ☆69Updated 6 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆10Updated 5 years ago
- All TMF files that I extracted from Microsoft PDBs.☆12Updated 5 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- CVE-2020-0601 #curveball - Alternative Key Calculator☆78Updated 5 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 4 years ago
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- Automatic generator of YARA modules based in protocol buffers☆16Updated 4 months ago
- Blocks drivers from loading by using a name collision technique. #nsacyber☆49Updated 7 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Simple windows backdoor command shell.☆21Updated 7 years ago
- Virtual machine detection. This is done by looking at registry keys, processes, files, internet access and specs such as disk storage, RA…☆18Updated 3 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- Open Standard Vulnerability & Compliance Scanner☆43Updated 9 years ago
- The Shodan developer documentation covering the various APIs for Shodan, Exploits, Scanhub and anything else that's offered by Shodan.☆19Updated 11 years ago
- 🦅 Falcon Malware Sandbox APIv2 Connector☆29Updated 2 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago
- Clone repository for Source Code secret anti-forensic tools Marble Framework CIA, Leaked by WikiLeaks.☆30Updated 8 years ago