Data to test capa's code and rules.
☆47Feb 17, 2026Updated last week
Alternatives and similar repositories for capa-testfiles
Users that are interested in capa-testfiles are comparing it to the libraries listed below
Sorting:
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆694Updated this week
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- THOR Thunderstorm Collectors☆25Updated this week
- Cockroach is your primitive & immortal swiss army knife.☆48Dec 8, 2021Updated 4 years ago
- Simple tool to extract icons from a pe file and other useful information☆13Jun 22, 2018Updated 7 years ago
- Summarize CTI reports with OpenAI☆18Updated this week
- x64dbg Malware Plugin. Detect malicious materials☆16Jun 13, 2020Updated 5 years ago
- Go bindings for YARA☆14Aug 24, 2025Updated 6 months ago
- A bunch of tricks and configs to configure a work environment for web pentesting☆13Oct 1, 2018Updated 7 years ago
- PyDV: Python Data Visualizer☆15Feb 17, 2026Updated last week
- ☆17Nov 3, 2017Updated 8 years ago
- A small library to extend the functionality of GetModuleHandle and GetProcAddress to other processes☆16Mar 23, 2020Updated 5 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- An API Monitor based on Instrumentation☆43Dec 19, 2017Updated 8 years ago
- Cybersecurity Incidents Mind Maps☆34Sep 29, 2021Updated 4 years ago
- Code snippets for Qiling Tutorials☆21Aug 22, 2020Updated 5 years ago
- Automate Sysmon Deployment and Configuration☆20Jul 26, 2024Updated last year
- Template for building a packet sniffer☆15Mar 25, 2024Updated last year
- WIP python3 plugin for x64dbg☆16Mar 31, 2021Updated 4 years ago
- VTC - Velociraptor Timeline Creator☆19May 15, 2024Updated last year
- Repository containing malware analysis filters for the Windows SysInternals' - Process Monitor tool☆20Oct 2, 2020Updated 5 years ago
- Set of test cases that can be used to test custom implementations of the SecRules language (ModSecurity rules format).☆17Feb 25, 2025Updated last year
- Shared libraries for other projects☆22Feb 20, 2026Updated last week
- ☆21Apr 19, 2024Updated last year
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- Useful library for validation of Bitcoin, Litecoin, Ethereum and other cryptocoin addresses☆20Aug 3, 2024Updated last year
- A Polkadot ecosystem index for investors. A self sustaining auction treasury for parachains.☆22Sep 9, 2022Updated 3 years ago
- Falcon Integration Gateway (FIG)☆23Updated this week
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆23Aug 21, 2023Updated 2 years ago
- Smart Card Utilities for Better Access (git-svn clone)☆22Nov 18, 2014Updated 11 years ago
- A python script that can be used to scan data within in an IDB using Yara.☆23Sep 4, 2018Updated 7 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆26Jan 1, 2017Updated 9 years ago
- Example Suricata rules implementing some of my detection tactics☆22Jan 13, 2023Updated 3 years ago
- Utilities for working with vivisect☆26Oct 1, 2025Updated 5 months ago
- ☆22Dec 22, 2020Updated 5 years ago
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆21Aug 26, 2025Updated 6 months ago
- pure Python binary analysis framework☆23Oct 26, 2018Updated 7 years ago
- Collection of rules created using YARA-Signator over Malpedia☆141Jan 6, 2026Updated last month
- XOR Key Extractor☆51Aug 10, 2024Updated last year