Merge all Yara rules from official Yara github repository in one .yar file
☆31Jun 22, 2018Updated 7 years ago
Alternatives and similar repositories for Yara_Merger
Users that are interested in Yara_Merger are comparing it to the libraries listed below
Sorting:
- ☆11Mar 12, 2021Updated 4 years ago
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 5 years ago
- Mass Triage Tools☆20Dec 16, 2025Updated 2 months ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Oct 16, 2019Updated 6 years ago
- ☆14Jan 24, 2016Updated 10 years ago
- ☆27Aug 25, 2020Updated 5 years ago
- Quick script to build host or investigation timelines using Carbon Black Response☆12Sep 25, 2018Updated 7 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- ☆18Dec 4, 2018Updated 7 years ago
- Volatility plugin to help identify DoublePulsar implant by listing the array of pointers SrvTransaction2DispatchTable from the srv.sys dr…☆16Aug 14, 2017Updated 8 years ago
- various methods of making API calls☆19Feb 1, 2025Updated last year
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆58Mar 25, 2020Updated 5 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 4 years ago
- Registry timestamp manipulation☆17Feb 26, 2014Updated 12 years ago
- scrapped ideas and garbage code☆13May 8, 2021Updated 4 years ago
- defcon framework by SeoulPlusBadass☆18Dec 11, 2022Updated 3 years ago
- Java class name obfuscation via classloader segregation and graph colouring☆18Jul 4, 2017Updated 8 years ago
- FRAC and RIFT☆17Mar 16, 2019Updated 6 years ago
- Powershell & Python XOR 2 Files☆15Nov 22, 2018Updated 7 years ago
- Parses Java Cache IDX files☆40Feb 28, 2018Updated 8 years ago
- ☆21Jul 27, 2020Updated 5 years ago
- Parse YARA rules and operate over them more easily.☆195Feb 6, 2025Updated last year
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- Automated library compilation and PDB annotation with CMake and IDA Pro☆21Sep 20, 2018Updated 7 years ago
- Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that a…☆22Dec 25, 2017Updated 8 years ago
- Simple windows backdoor command shell.☆20Dec 4, 2017Updated 8 years ago
- OLE Package Format Documentation☆23Jun 13, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/narly☆24Jul 11, 2021Updated 4 years ago
- 快速搭建各种漏洞环境(Various vulnerability environment) https://hub.docker.com/r/medicean/vulapps/☆19Sep 9, 2017Updated 8 years ago
- PCILeech HP iLO4 Service☆24Jan 9, 2019Updated 7 years ago
- CVE-2017-10271 POC☆29Jan 10, 2018Updated 8 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- ☆19Oct 23, 2020Updated 5 years ago