Yara Based Detection Engine for web browsers
☆50Sep 5, 2021Updated 4 years ago
Alternatives and similar repositories for Yobi
Users that are interested in Yobi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Yara rules for malicious javascript files from public repositories or written by me.☆13Nov 12, 2021Updated 4 years ago
- PoC compilation of libyara into WASM, for potential future CyberChef integration☆14Sep 18, 2022Updated 3 years ago
- A .NET assembly tracer using Harmony for runtime method interception.☆50Oct 24, 2025Updated 6 months ago
- YARA support for Node.js☆14May 19, 2021Updated 4 years ago
- Decentralized One Time Passwords☆12Dec 11, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆38Jan 3, 2022Updated 4 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 5 years ago
- DEbian Cve REproducer Tool☆27Jan 8, 2026Updated 3 months ago
- MalwareAnalysis☆12Dec 19, 2020Updated 5 years ago
- Scripts to aid analysis of files obfuscated with ScatterBee.☆24Jan 6, 2023Updated 3 years ago
- Royal Road RTF Weaponizer object decoder☆24Sep 26, 2024Updated last year
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 9 years ago
- Some YARA rules i will add from time to time☆68Mar 25, 2023Updated 3 years ago
- Website crawler with YARA detection☆90Aug 20, 2023Updated 2 years ago
- PHP Script demonstrating a smart honey pot.☆18Apr 19, 2014Updated 12 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Oct 30, 2023Updated 2 years ago
- [deprecated] Simple x64dbg plugin to save a full memory dump☆51Oct 10, 2022Updated 3 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆21May 29, 2018Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Hex Calculator for Windows☆13Dec 2, 2016Updated 9 years ago
- ☆39Jul 29, 2021Updated 4 years ago
- 新闻聚合+新闻推荐网站☆10Jun 21, 2017Updated 8 years ago
- A collection of shellcode hashes☆17Aug 15, 2018Updated 7 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- WordPress Honeypot☆35Jan 18, 2018Updated 8 years ago
- Look into EDR events from network☆25Nov 20, 2025Updated 5 months ago
- MAL-CL (Malicious Command-Line)☆324Jan 10, 2023Updated 3 years ago
- Carbon Black integration Python utility library☆12Oct 29, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A Visual Studio Code Extension agent for Mythic C2☆72Nov 5, 2024Updated last year
- Validates yara rules and tries to repair the broken ones.☆41Sep 5, 2020Updated 5 years ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 8 years ago
- Base service class from Assemblyline 4☆15Apr 23, 2026Updated last week
- The CyberCX Digger project is designed to help Australian organisations determine if they have been impacted by certain high profile cybe…☆44Sep 17, 2020Updated 5 years ago
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 8 years ago
- Slides and materials for the talk Reconstructing Rust Types: A Practical Guide for Reverse Engineers at RE//verse 2025, presented on Febr…☆25May 23, 2025Updated 11 months ago