eset / yara
The pattern matching swiss knife
☆15Updated 5 years ago
Alternatives and similar repositories for yara:
Users that are interested in yara are comparing it to the libraries listed below
- Decrypts Cisco VPN Group Passwords☆17Updated 13 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆9Updated 5 years ago
- Simplified NAT Slipstream server and client☆21Updated 4 years ago
- Automatic generator of YARA modules based in protocol buffers☆16Updated 3 months ago
- This repository contains various shell scripts and tips and tricks used for packaging androidtamer packages☆11Updated 2 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- Checklists☆16Updated 8 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- ☆16Updated 2 years ago
- Source distribution of the Ghidra software reverse engineering (SRE) framework https://www.nsa.gov/ghidra☆9Updated 6 years ago
- A simple, lightweight Remote Access Tool written in Python☆17Updated 6 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- A repository of example plugins for Relyze Desktop.☆34Updated 5 years ago
- Geppetto - Virtual machine and infrastructure orchestration☆13Updated 2 months ago
- Dump Windows registry hives as text.☆16Updated 6 years ago
- Simple windows backdoor command shell.☆21Updated 7 years ago
- Casper is a tiny system tray application that can be used to view the invisible windows on your desktop.☆11Updated 8 years ago
- The Shodan developer documentation covering the various APIs for Shodan, Exploits, Scanhub and anything else that's offered by Shodan.☆19Updated 11 years ago
- My modern disassemblies of paleolithic (DOS-era) malware!☆10Updated 5 years ago
- All TMF files that I extracted from Microsoft PDBs.☆12Updated 5 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- transparent TCP-to-proxy redirector☆16Updated 5 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- A library which makes modification of browsers' behavior easy.☆10Updated 4 years ago
- Zero Wine Tryouts: An open source malware analysis tool☆17Updated 8 years ago
- module for certexfil☆15Updated 2 years ago
- Tips to protect your personal and company data☆28Updated 4 years ago
- Simple AutoIt crypter.☆11Updated 8 years ago