pracsec / YaraTools
Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.
☆23Updated 2 years ago
Alternatives and similar repositories for YaraTools:
Users that are interested in YaraTools are comparing it to the libraries listed below
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- ☆18Updated 10 months ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated last year
- Collection of generic YARA rules☆15Updated 8 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Searching .evtx logs for remote connections☆24Updated last year
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 2 years ago
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- Triaging Windows event logs based on SANS Poster☆38Updated 2 years ago
- A collection of my presentation materials.☆16Updated 9 months ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 7 months ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 10 months ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- ☆14Updated 2 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆46Updated 2 years ago
- ☆24Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- ☆52Updated 2 months ago
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆48Updated last year
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆14Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆25Updated 7 months ago
- AutoPoC Generator HoneyPoC☆35Updated 7 months ago
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago