Detection Rules for Quark Engine. Please use the website below to explore our rules.
☆31Jan 23, 2026Updated last month
Alternatives and similar repositories for quark-rules
Users that are interested in quark-rules are comparing it to the libraries listed below
Sorting:
- Collections of Quark Script that detect vulnerabilities in the binaries.☆20Aug 31, 2025Updated 6 months ago
- ☆10Jul 3, 2021Updated 4 years ago
- Small tool to run reverse IP lookup for given IP, IP range or IP list☆13Jan 2, 2020Updated 6 years ago
- ☆1,644Feb 20, 2026Updated last week
- Bolster NEO API - Artificial intelligence based zero-hour phishing detection☆13Aug 10, 2021Updated 4 years ago
- Fork of rsakeyfind☆20Aug 27, 2017Updated 8 years ago
- a modified version base on Tracecorn☆20Oct 29, 2019Updated 6 years ago
- Incident Response Network Tools☆24Jul 23, 2021Updated 4 years ago
- ddos-checker is a tool used to perform a test on a website from a DDOS attack to find security gaps in a website.☆11Oct 16, 2025Updated 4 months ago
- Pwn2Win CTF 2018 NIZK (Non-Interactive Zero-Knowledge) Platform☆30Dec 2, 2018Updated 7 years ago
- ☆32Aug 1, 2024Updated last year
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated 3 weeks ago
- Android Connections Forensics☆33Dec 15, 2015Updated 10 years ago
- Tool aimed to provide a binary analysis of different file formats through the use of an Intermmediate Representation.☆144Mar 31, 2024Updated last year
- Property extractor for Android apps☆311Mar 24, 2025Updated 11 months ago
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆35Oct 4, 2024Updated last year
- Demos and presentation from SECArmy Village Grayhat 2020☆37Mar 15, 2023Updated 2 years ago
- ☆13Aug 28, 2025Updated 6 months ago
- The C-Agent is a reference implementation of a Keyfactor Orchestrator geared toward use in IoT based solutions.☆12Aug 28, 2025Updated 6 months ago
- This is a templated to be used for QRL Jacking Sessions (Tested on Chrome,brave & firefox )☆13Feb 26, 2022Updated 4 years ago
- Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services [ Android-Support-Available ]☆11Nov 14, 2020Updated 5 years ago
- An full-stack eCommerce store web application in nodejs☆11Jun 6, 2024Updated last year
- My personal profile!☆17Oct 25, 2024Updated last year
- Build a project with Express.js☆11Jan 31, 2021Updated 5 years ago
- Ghi chép về snort, suricata, SIEM, OSSEC ...☆11Dec 4, 2018Updated 7 years ago
- An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full …☆44Sep 6, 2024Updated last year
- Akira Bot adalah Bot Whatsapp yg Memiliki 500+ Fitur, dan Menggunakan Bermacam² Rest Api☆10Apr 6, 2021Updated 4 years ago
- NIST transition-edge sensor (TES) data acquisition framework☆16Updated this week
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆37Mar 15, 2023Updated 2 years ago
- A command line Windows API tracing tool for Golang binaries.☆159Dec 4, 2023Updated 2 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆164Mar 27, 2025Updated 11 months ago
- Fast lookup server for NSRL and other hash database used in digital forensic☆48Jan 26, 2026Updated last month
- Integration between SIEMs and TAXII services☆10Mar 2, 2023Updated 2 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Metadefender Core (Metascan v.4 and v.3) analysis module for Viper malware analysis framework☆10Jan 6, 2021Updated 5 years ago
- metwork/mfserv module☆12Feb 7, 2026Updated 3 weeks ago