kevthehermit / PasteHunterView external linksLinks
Scanning pastebin with yara rules
☆1,126Jan 10, 2026Updated last month
Alternatives and similar repositories for PasteHunter
Users that are interested in PasteHunter are comparing it to the libraries listed below
Sorting:
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,361Feb 4, 2026Updated last week
- Online hash checker for Virustotal and other services☆845Mar 21, 2025Updated 10 months ago
- Malware Configuration And Payload Extraction☆761Nov 22, 2024Updated last year
- FAME Automates Malware Evaluation☆926Dec 16, 2025Updated last month
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆554May 9, 2023Updated 2 years ago
- Phishing catcher using Certstream☆1,790Aug 13, 2024Updated last year
- Your Everyday Threat Intelligence☆1,949Updated this week
- 16,432 Free Yara rules created by☆390Jun 1, 2019Updated 6 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,218Nov 20, 2025Updated 2 months ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,313Jan 22, 2025Updated last year
- A Yara rule generator for finding related samples and hunting☆162Sep 11, 2022Updated 3 years ago
- Binary analysis and management framework☆1,557Jun 7, 2023Updated 2 years ago
- Loki - Simple IOC and YARA Scanner☆3,719Jan 12, 2026Updated last month
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,475Jan 12, 2026Updated last month
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- Python Decoders for Common Remote Access Trojans☆1,116Jul 16, 2024Updated last year
- YARA signature and IOC database for my scanners and tools☆2,864Feb 5, 2026Updated last week
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,901Jul 6, 2024Updated last year
- HTA encryption tool for RedTeams☆1,425Nov 9, 2022Updated 3 years ago
- Pastebin OSINT Harvester☆329Apr 27, 2019Updated 6 years ago
- Python script to decode common encoded PowerShell scripts☆217Jun 13, 2018Updated 7 years ago
- Find interesting Amazon S3 Buckets by watching certificate transparency logs.☆1,800Feb 28, 2025Updated 11 months ago
- Powershell C2 Server and Implants☆574Nov 11, 2019Updated 6 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,638Jan 5, 2026Updated last month
- VirusTotal Wanna Be - Now with 100% more Hipster☆1,850Apr 3, 2023Updated 2 years ago
- Automated, Collection, and Enrichment Platform☆324Nov 14, 2019Updated 6 years ago
- A Tool for Domain Flyovers☆5,897May 22, 2022Updated 3 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,710Sep 23, 2025Updated 4 months ago
- Kaspersky's GReAT KLara☆730Jul 24, 2024Updated last year
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,111Nov 3, 2017Updated 8 years ago
- A curated list of awesome YARA rules, tools, and people.☆4,136Mar 26, 2025Updated 10 months ago
- yarGen is a generator for YARA rules☆1,774Jan 10, 2026Updated last month
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,583Apr 15, 2025Updated 9 months ago
- An information security preparedness tool to do adversarial simulation.☆1,142Apr 1, 2019Updated 6 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,035May 27, 2020Updated 5 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,448Nov 20, 2025Updated 2 months ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆504Oct 21, 2022Updated 3 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago