iomoath / yara-scannerView external linksLinks
YaraScanner is a file pattern-matching tool based on YARA rules.
☆60Apr 26, 2023Updated 2 years ago
Alternatives and similar repositories for yara-scanner
Users that are interested in yara-scanner are comparing it to the libraries listed below
Sorting:
- A Python wrapper library for libyara and a local server for fully utilizing the CPUs of the system to scan with yara...with additional ca…☆19Dec 8, 2022Updated 3 years ago
- Malware - Machine Learning☆11Mar 24, 2018Updated 7 years ago
- Notes Template/Checklist for PEN-300 OSEP☆16Nov 20, 2021Updated 4 years ago
- This is a collection of known malware and threats found on various Linux/web servers. Also find known ways to detect☆12Aug 1, 2020Updated 5 years ago
- Grafanav8.*版本任意文件读取漏洞批量检测工具:该漏洞目前为0day漏洞,未授权的攻击者利用该漏洞,能够获取服务器敏感文件。☆12Dec 23, 2021Updated 4 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- ☆13Feb 6, 2018Updated 8 years ago
- Microsoft 365 Defender Hunting via PowerShell.☆14Feb 8, 2022Updated 4 years ago
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆16Jun 9, 2023Updated 2 years ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆19Apr 17, 2024Updated last year
- ☆14Aug 21, 2022Updated 3 years ago
- gokrazy remote syslog server daemon: writes to disk what it receives via remote syslog☆14May 10, 2024Updated last year
- Security even with a small budget - there is no excuse!☆20May 24, 2023Updated 2 years ago
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- Integration between MISP platform and McAfee MVISION EDR☆14Mar 14, 2022Updated 3 years ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆14Dec 7, 2019Updated 6 years ago
- Malice Windows Defender AntiVirus Plugin☆39Mar 7, 2023Updated 2 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Sep 14, 2023Updated 2 years ago
- View screenshots as a slideshow over http☆15Mar 13, 2020Updated 5 years ago
- pySigma Splunk backend☆41Feb 8, 2026Updated last week
- ☆21Nov 7, 2023Updated 2 years ago
- CVE-2020-14882 Weblogic-Exp☆17Oct 29, 2020Updated 5 years ago
- Validates yara rules and tries to repair the broken ones.☆41Sep 5, 2020Updated 5 years ago
- Repo to track SANS BlueTeam Summit Presentation☆23Oct 4, 2022Updated 3 years ago
- My conference presentations☆87Nov 11, 2025Updated 3 months ago
- Cobalt Strike BOF Files with Nim!☆86Jul 10, 2022Updated 3 years ago
- ☆13May 24, 2023Updated 2 years ago
- Browser extension that complements the PhishDetect service☆24Feb 3, 2023Updated 3 years ago
- Generate bulk YARA rules from YAML input☆22Feb 3, 2020Updated 6 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Jul 27, 2021Updated 4 years ago
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆643Jun 19, 2024Updated last year
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆30Feb 15, 2022Updated 4 years ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆142Updated this week
- CVE-2021-43798:Grafana 任意文件读取漏洞☆25Dec 7, 2021Updated 4 years ago
- Script to automate Linux live evidence collection☆28Aug 4, 2022Updated 3 years ago
- ☆19Mar 23, 2021Updated 4 years ago
- Active C2 IoCs☆99Nov 28, 2022Updated 3 years ago
- CAPE Auto-Hardened Installer☆25Jan 28, 2026Updated 2 weeks ago