eset / yaraLinks
The pattern matching swiss knife
☆15Updated 5 years ago
Alternatives and similar repositories for yara
Users that are interested in yara are comparing it to the libraries listed below
Sorting:
- The Shodan developer documentation covering the various APIs for Shodan, Exploits, Scanhub and anything else that's offered by Shodan.☆19Updated 11 years ago
- Network based steganography based control channels and chat.☆8Updated 9 years ago
- Decrypts Cisco VPN Group Passwords☆17Updated 13 years ago
- Simplified NAT Slipstream server and client☆22Updated 4 years ago
- All TMF files that I extracted from Microsoft PDBs.☆13Updated 6 years ago
- Automatic generator of YARA modules based in protocol buffers☆16Updated 5 months ago
- A curated list of awesome malware analysis tools and resources☆15Updated 7 years ago
- Tips to protect your personal and company data☆29Updated 5 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago
- Geppetto - Virtual machine and infrastructure orchestration☆13Updated 4 months ago
- A tool for securing communications between a client and a DNS resolver☆31Updated 12 years ago
- xlrd2 is a variant of xlrd that is actively maintained☆23Updated 11 months ago
- MobaXterm - X11 server, tabbed SSH client, network tools and much more☆14Updated 6 years ago
- Digital Forensics date and time☆24Updated 6 months ago
- Collection of cracked malware☆14Updated 6 years ago
- Scripts for producing release artefacts and signing, pushing and verifyig them. Note: This is superseded by OpenVPN/openvpn-build.☆10Updated 2 years ago
- Powerful Python tool to analyze PDF documents☆25Updated 3 years ago
- building blocks for tor project websites☆13Updated 2 weeks ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- The online version of Ciphey☆18Updated last year
- ☆16Updated 2 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆10Updated 5 years ago
- Dependencies for Veil 3☆17Updated 8 years ago
- ☆53Updated 6 months ago
- Sophos Deobfuscation Tool. Deobfuscates passwords obfuscated with Sophos Obfuscation Tool.☆16Updated 7 years ago
- Virtual machine detection. This is done by looking at registry keys, processes, files, internet access and specs such as disk storage, RA…☆18Updated 3 years ago
- Checklists☆17Updated 8 years ago
- ☆70Updated 6 years ago
- An HTTP proxy that enables access to Tor Onion Services☆16Updated 3 years ago
- Various Crypter Project☆9Updated 11 years ago