Deduplication of yara rules
☆10Sep 18, 2017Updated 8 years ago
Alternatives and similar repositories for dedupe_yara_rule
Users that are interested in dedupe_yara_rule are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- YARA duplicate rule detection and removal. YARA rule index creation. YARA rule file merger.☆10Jan 19, 2026Updated 2 months ago
- Coming to a place near you.....☆25Jun 29, 2015Updated 10 years ago
- Troopers Conference Supporting Materials☆12Apr 8, 2015Updated 10 years ago
- Syslog client written in Rust☆17May 7, 2025Updated 10 months ago
- Dynamic rust bindings to the Windows API☆17Jul 1, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Genyris presents a paradigm in which objects can belong to multiple classes independent from construction allowing data to be classified …☆17Mar 22, 2026Updated last week
- A simple Gradle plugin to render PlantUML files☆10Nov 6, 2023Updated 2 years ago
- Presents a method for supporting partial resource modifications in JAX-RS applications.☆12Apr 30, 2016Updated 9 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- JWT Verifier that uses jwks endpoints☆13Jan 5, 2023Updated 3 years ago
- Scripts for OWASP-ZAP☆13Oct 7, 2025Updated 5 months ago
- Motor support for Quart applications☆17Feb 17, 2024Updated 2 years ago
- Minimal IRC client in Elm.☆18Jun 5, 2019Updated 6 years ago
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Aug 19, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- RSS to email script☆11Jul 27, 2012Updated 13 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Jan 10, 2016Updated 10 years ago
- A rest api to manage a users/group/meetings system, powered by Django and MongoDB, using OAuth2 for autentication and autorization.☆12Mar 23, 2017Updated 9 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- super simple uvloop class for tornado framework☆15Mar 12, 2018Updated 8 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14May 31, 2020Updated 5 years ago
- - Wireless Headphone Refresher☆18Jul 30, 2016Updated 9 years ago
- Tools for static and dynamic analysis of ActionScript3 SWF files.☆46Oct 5, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Password guessers for popular vulnerability scanners and frameworks: Find the password for your favourite vulnscanners: OpenVAS, Nessus, …☆30Nov 8, 2012Updated 13 years ago
- Integration between MISP platform and McAfee MVISION EDR☆14Mar 14, 2022Updated 4 years ago
- ☆15Sep 26, 2022Updated 3 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- CSV processing and web related data types mutual conversion☆17Feb 24, 2026Updated last month
- Utilities for the memory forensics framework☆22Jul 31, 2018Updated 7 years ago
- open-source intelligence gathering for SIEMs <3☆38Feb 16, 2017Updated 9 years ago
- BashBunny Total P0wn System☆18Sep 16, 2017Updated 8 years ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆12Dec 8, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Modified edition of cuckoomon☆23Sep 9, 2019Updated 6 years ago
- Global keyboard events in Elm☆25Aug 22, 2018Updated 7 years ago
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- Authenticode-parser is a simple C library for Authenticode format parsing using OpenSSL.☆25Mar 2, 2024Updated 2 years ago
- A basic elm example of drag and drop reorder☆28Aug 19, 2020Updated 5 years ago
- Network detector for Winnti malware☆21Mar 6, 2018Updated 8 years ago
- A python script that can be used to scan data within in an IDB using Yara.☆23Sep 4, 2018Updated 7 years ago