Framework for Monitoring File Ingestion Source for Yara Matches
☆51Mar 10, 2025Updated last year
Alternatives and similar repositories for YaraMonitor
Users that are interested in YaraMonitor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SprayShark is a modular G-Suite password sprayer with threading!☆58May 17, 2025Updated 10 months ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 8 months ago
- ☆87Mar 30, 2026Updated 2 weeks ago
- Autonomous AI C2☆32Jul 23, 2024Updated last year
- Burp Suite extension for testing Passkey systems.☆76Apr 1, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A collection of Turbo Intruder scripts.☆71Feb 1, 2025Updated last year
- ☆18Feb 2, 2026Updated 2 months ago
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated last year
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆16Apr 10, 2025Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- Addon for BHCE☆57Apr 1, 2025Updated last year
- ☆23Mar 4, 2025Updated last year
- Find what egress ports are allowed☆46Nov 19, 2025Updated 4 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆41May 7, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- Collection of my own detection rules☆20Jan 6, 2026Updated 3 months ago
- Linux CS bypass technique☆33Feb 4, 2025Updated last year
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆52Dec 31, 2024Updated last year
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Apr 1, 2026Updated last week
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated last year
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- Validate the isolation posture of your container environment.☆314Feb 11, 2026Updated 2 months ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆44Sep 16, 2025Updated 6 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Apr 3, 2026Updated last week
- Knowledge base for reverse engineering and malware analysis☆15Jan 11, 2026Updated 3 months ago
- ☆21Updated this week
- ☆72Oct 24, 2025Updated 5 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- A tool for secrets management, encryption as a service, and privileged access management☆12Jul 17, 2025Updated 8 months ago
- A fork of the Go language with some tweaks☆56Jan 29, 2025Updated last year
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆39Aug 8, 2025Updated 8 months ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆29Jul 11, 2025Updated 9 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆101Apr 7, 2026Updated last week
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 2 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆111May 30, 2025Updated 10 months ago
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆176Jan 9, 2026Updated 3 months ago
- ☆44Jul 17, 2025Updated 8 months ago
- A repository to store community malware research notes and findings.☆15Feb 13, 2026Updated 2 months ago
- Ingest Nessus files into Elasticsearch using PowerShell!☆19Mar 22, 2026Updated 3 weeks ago