Scanning pastebin with yara rules
☆1,133Jan 10, 2026Updated 3 months ago
Alternatives and similar repositories for PasteHunter
Users that are interested in PasteHunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,370Apr 29, 2026Updated last week
- A Yara rule generator for finding related samples and hunting☆165Sep 11, 2022Updated 3 years ago
- 16,432 Free Yara rules created by☆388Jun 1, 2019Updated 6 years ago
- Online hash checker for Virustotal and other services☆849Mar 21, 2025Updated last year
- FAME Automates Malware Evaluation☆937Updated this week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Malware Configuration And Payload Extraction☆760Nov 22, 2024Updated last year
- Find interesting Amazon S3 Buckets by watching certificate transparency logs.☆1,803Feb 28, 2025Updated last year
- Phishing catcher using Certstream☆1,802Aug 13, 2024Updated last year
- Your Everyday Threat Intelligence☆1,977Apr 14, 2026Updated 3 weeks ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆557May 9, 2023Updated 3 years ago
- YARA signature and IOC database for my scanners and tools☆2,949Updated this week
- Binary analysis and management framework☆1,561Jun 7, 2023Updated 2 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,281Nov 20, 2025Updated 5 months ago
- Loki - Simple IOC and YARA Scanner☆3,753Jan 12, 2026Updated 3 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Pastebin OSINT Harvester☆330Apr 27, 2019Updated 7 years ago
- A curated list of awesome YARA rules, tools, and people.☆4,194Mar 16, 2026Updated last month
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,317Jan 22, 2025Updated last year
- Reconnaissance tool for GitHub organizations☆6,166Sep 20, 2022Updated 3 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,715Jan 5, 2026Updated 4 months ago
- VirusTotal Wanna Be - Now with 100% more Hipster☆1,855Apr 3, 2023Updated 3 years ago
- Python Decoders for Common Remote Access Trojans☆1,118Jul 16, 2024Updated last year
- Kaspersky's GReAT KLara☆731Jul 24, 2024Updated last year
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,956Jul 6, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,544Jan 12, 2026Updated 3 months ago
- A Tool for Domain Flyovers☆5,930May 22, 2022Updated 3 years ago
- yarGen is a generator for YARA rules☆1,786Jan 10, 2026Updated 3 months ago
- Python script to decode common encoded PowerShell scripts☆216Jun 13, 2018Updated 7 years ago
- Extract and aggregate threat intelligence.☆913Jan 31, 2024Updated 2 years ago
- Django web interface for managing Yara rules☆196Jul 28, 2018Updated 7 years ago
- Automated, Collection, and Enrichment Platform☆326Nov 14, 2019Updated 6 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 8 years ago
- Repository of yara rules☆4,779Apr 17, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A toolset to make a system look as if it was the victim of an APT attack☆2,739Sep 23, 2025Updated 7 months ago
- Python Pastebin Webcrawler that returns list of public pastebins containing keywords☆448Aug 24, 2021Updated 4 years ago
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,668Apr 15, 2025Updated last year
- Command line tool for scanning streams within office documents plus xor db attack☆127Sep 23, 2023Updated 2 years ago
- HTA encryption tool for RedTeams☆1,426Nov 9, 2022Updated 3 years ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,488Jan 9, 2025Updated last year
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆156Dec 20, 2019Updated 6 years ago