☆54Sep 6, 2020Updated 5 years ago
Alternatives and similar repositories for narc
Users that are interested in narc are comparing it to the libraries listed below
Sorting:
- Python API bindings for FireEye Products☆13Feb 17, 2021Updated 5 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- yaa - yaml search for humans☆12Dec 8, 2025Updated 2 months ago
- Scan outlook inbox with yara rules,APIs and IOCs☆14Aug 3, 2018Updated 7 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- For all these times you're asking yourself "what is this panel again?"☆260Jan 29, 2026Updated last month
- Various Modules & Scripts for use with Viper Framework☆27Aug 20, 2019Updated 6 years ago
- ☆14Mar 9, 2023Updated 2 years ago
- FireEye iSIGHT Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆16Oct 12, 2018Updated 7 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Aug 26, 2020Updated 5 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- ☆27Jun 17, 2021Updated 4 years ago
- VirusTotal Intelligence Notification Puller☆28Jun 29, 2016Updated 9 years ago
- ☆13Oct 7, 2019Updated 6 years ago
- Dump objects from .NET dumps.☆51Apr 19, 2022Updated 3 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- Sample staging & detonation utility to be used in combination with Cuckoo Sandbox.☆85Dec 5, 2023Updated 2 years ago
- Yara Ruleset for scanning Linux servers for shells, spamming, phishing and other webserver baddies☆107Mar 4, 2021Updated 4 years ago
- ☆537Feb 19, 2026Updated last week
- IoC's, PCRE's, YARA's etc☆23Mar 25, 2025Updated 11 months ago
- Use this library to automatically extract PE files compressed with aplib from a binary blob.☆34May 21, 2019Updated 6 years ago
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆22Oct 31, 2018Updated 7 years ago
- Collect and filter location information from social network services.☆11Jun 14, 2020Updated 5 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆168Oct 14, 2022Updated 3 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- ☆27Feb 6, 2022Updated 4 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- Resources, articles, thoughts, datasets, papers on TI tradecraft☆11Aug 24, 2018Updated 7 years ago
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- ☆17Jan 12, 2026Updated last month