eset / yaraLinks
The pattern matching swiss knife
☆16Updated 6 years ago
Alternatives and similar repositories for yara
Users that are interested in yara are comparing it to the libraries listed below
Sorting:
- Dragon Sandbox☆79Updated 12 years ago
- Dependencies for Veil 3☆17Updated 8 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
- Decrypts Cisco VPN Group Passwords☆18Updated 13 years ago
- Simple windows backdoor command shell.☆20Updated 7 years ago
- ☆56Updated 10 months ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Blocks drivers from loading by using a name collision technique. #nsacyber☆50Updated 7 years ago
- pure Python binary analysis framework☆23Updated 7 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 6 years ago
- Open Standard Vulnerability & Compliance Scanner☆46Updated 10 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆28Updated 6 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 5 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆130Updated 12 years ago
- Windows DLL Loading Utility☆12Updated 5 years ago
- CAPE monitor DLLs☆41Updated 5 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- A Passive DNS backend and collector☆31Updated 3 years ago
- ☆70Updated 6 years ago
- My metasploit modules☆24Updated 9 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 11 years ago
- KIMS Multi AV Scanner by DSR!☆31Updated 5 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 9 years ago
- 🔵 ethereum grid trading bot☆35Updated last month
- Service for management of hosts where is present a malware developed using Richkware framework.☆18Updated last year
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27Updated 9 years ago
- xlrd2 is a variant of xlrd that is actively maintained☆23Updated last year
- Malware captured with honeypots☆38Updated 8 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago