YaraScanner is a file pattern-matching tool based on YARA rules.
☆60Apr 26, 2023Updated 2 years ago
Alternatives and similar repositories for yara-scanner
Users that are interested in yara-scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Command line interface client to RFQuack dongles☆10Sep 23, 2022Updated 3 years ago
- A Python wrapper library for libyara and a local server for fully utilizing the CPUs of the system to scan with yara...with additional ca…☆19Dec 8, 2022Updated 3 years ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆18Apr 17, 2024Updated last year
- Microsoft 365 Defender Hunting via PowerShell.☆14Feb 8, 2022Updated 4 years ago
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆13Dec 7, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆14Aug 21, 2022Updated 3 years ago
- Malware - Machine Learning☆11Mar 24, 2018Updated 8 years ago
- ☆21Nov 7, 2023Updated 2 years ago
- Repository with selected IOCs and YARA rules for threat hunting.☆35Updated this week
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆185Updated this week
- Notes Template/Checklist for PEN-300 OSEP☆17Nov 20, 2021Updated 4 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Sep 14, 2023Updated 2 years ago
- Automated Yara Rule generation using Biclustering☆78Oct 8, 2025Updated 6 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆17Oct 13, 2025Updated 5 months ago
- Validates yara rules and tries to repair the broken ones.☆41Sep 5, 2020Updated 5 years ago
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆26Jun 30, 2021Updated 4 years ago
- Audit Node Module folder with YARA rules to identify possible malicious packages hiding in node_moudles☆20Mar 24, 2021Updated 5 years ago
- pySigma Splunk backend☆41Mar 22, 2026Updated 2 weeks ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Golang C2 and Beacon/Agent built from the ground up for scalability and expandability☆14Mar 16, 2021Updated 5 years ago
- Integration between MISP platform and McAfee MVISION EDR☆14Mar 14, 2022Updated 4 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Sep 13, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Python based CLI for MalwareBazaar☆39Jul 22, 2025Updated 8 months ago
- A Malware classifier dataset built with header fields’ values of Portable Executable files☆92Dec 2, 2022Updated 3 years ago
- ☆13Oct 21, 2022Updated 3 years ago
- VMware Workspace ONE Access and Identity Manager RCE via SSTI - Test script for shodan, file or manual.☆16Feb 13, 2024Updated 2 years ago
- Grafanav8.*版本任意文件读取漏洞批量检测工具:该漏洞目前为0day漏洞,未授权的攻击者利用该漏洞,能够获取服务器敏感文件。☆13Dec 23, 2021Updated 4 years ago
- CVE-2020-14882 Weblogic-Exp☆17Oct 29, 2020Updated 5 years ago
- Tools for the Computer Incident Response Team☆150Apr 17, 2017Updated 8 years ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 8 months ago
- ☆27Aug 15, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- some sploits☆19Sep 20, 2024Updated last year
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆71Mar 13, 2018Updated 8 years ago
- Active C2 IoCs☆99Nov 28, 2022Updated 3 years ago
- Cobalt Strike BOF Files with Nim!☆86Jul 10, 2022Updated 3 years ago
- mpeepdf is a modified version of a powerful Python tool - peepdf to analyze PDF documents☆17Jan 1, 2019Updated 7 years ago
- 恶意代码家族聚类。DataCon☆11Jun 4, 2019Updated 6 years ago
- View screenshots as a slideshow over http☆15Mar 13, 2020Updated 6 years ago