Yara powered NIDS with high speed packet capture powered by PF_RING
☆69May 11, 2024Updated last year
Alternatives and similar repositories for mole
Users that are interested in mole are comparing it to the libraries listed below
Sorting:
- GO开发而成,用于NIDS HIDS 分析的规则引擎,使用WorkerPool 高性能检测,支持多字段 "和" "或" 检测, 支持频率检测☆78Feb 8, 2025Updated last year
- ☆12Aug 10, 2019Updated 6 years ago
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- Base64 Mutator☆13Feb 13, 2021Updated 5 years ago
- 🐳 Docker based Golang development environment☆12Nov 15, 2020Updated 5 years ago
- Some rules, scripts of some use to us☆11Oct 25, 2024Updated last year
- Peer to Peer botnet☆13Aug 7, 2020Updated 5 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- ☆28Aug 10, 2019Updated 6 years ago
- Suricata Extreme Performance Tuning guide☆213Mar 15, 2018Updated 7 years ago
- VirusTotal Intelligence Notification Puller☆28Jun 29, 2016Updated 9 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Golang 解析Wappalyzer指纹库,暂不支持识别☆13Oct 10, 2020Updated 5 years ago
- bilgge api server. bilgge is a privacy-paranoid free service allows you take notes and store secrets while protecting from evil eyes.☆11Jul 24, 2021Updated 4 years ago
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 9 months ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Run TTPs, with AI!☆71Feb 23, 2026Updated last week
- Password list character frequency analyzer that can output hashcat masks☆16May 22, 2019Updated 6 years ago
- gonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that…☆192Jul 18, 2025Updated 7 months ago
- gyp: A pure Go YARA parser☆107Mar 13, 2024Updated last year
- Ghosting-AMSI☆18Apr 30, 2025Updated 10 months ago
- Some simple process injection techniques targeting the Windows platform☆32Feb 9, 2020Updated 6 years ago
- Hybrid Port Knocking System☆22Jan 11, 2021Updated 5 years ago
- Data EXfiltration TestER☆21Aug 28, 2019Updated 6 years ago
- Go bindings for YARA☆386Jul 1, 2025Updated 8 months ago
- sget is a keyless safe script retrieval and execution tool☆18Feb 7, 2022Updated 4 years ago
- Dynamic Outbound Firewall Authorizer☆22Apr 14, 2022Updated 3 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆126Jun 10, 2023Updated 2 years ago
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆16Sep 7, 2023Updated 2 years ago
- Cerberus is another simple stressing tool simulating DDoS attacks.☆21Mar 13, 2025Updated 11 months ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20May 25, 2022Updated 3 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆24May 21, 2023Updated 2 years ago
- Learning notes of amazing Sliver C2 project.☆25Apr 14, 2023Updated 2 years ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 3 months ago
- Speed up GitHub access by modifying DNS response packets using eBPF☆27Jan 6, 2023Updated 3 years ago
- 处于原型阶段☆20Nov 30, 2021Updated 4 years ago
- ☆19Oct 23, 2020Updated 5 years ago