A Vim syntax highlighting for YARA and YARA-X rules
☆31Jan 1, 2026Updated 2 months ago
Alternatives and similar repositories for vim-syntax-yara
Users that are interested in vim-syntax-yara are comparing it to the libraries listed below
Sorting:
- ☆23Jun 1, 2023Updated 2 years ago
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆12Jan 31, 2025Updated last year
- ☆23Mar 17, 2024Updated last year
- Example agents for the Dreadnode platform☆24Dec 19, 2025Updated 2 months ago
- ☆12Nov 21, 2023Updated 2 years ago
- Ghosting-AMSI☆18Apr 30, 2025Updated 10 months ago
- YARA package for Sublime Text☆19Nov 30, 2025Updated 3 months ago
- a open source rat from china☆26Oct 28, 2016Updated 9 years ago
- Repository of yara rules☆47Sep 7, 2015Updated 10 years ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆23Dec 12, 2021Updated 4 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- because twin clams are better than one clam?☆29Jan 30, 2026Updated last month
- ☆26Jun 2, 2022Updated 3 years ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 2 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆29Feb 15, 2019Updated 7 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Dec 4, 2025Updated 3 months ago
- A Python based Image to ANSI converter☆30May 26, 2022Updated 3 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- ☆36Jan 11, 2023Updated 3 years ago
- Proofpoint - Emerging Threats - Threat Research tools + publicly shared intel and documentation☆82Jan 28, 2026Updated last month
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Feb 7, 2026Updated 3 weeks ago
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- ☆10Aug 9, 2024Updated last year
- Material do Grupo de Estudos em Ciência de Dados☆13Jan 25, 2021Updated 5 years ago
- DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted …☆340Feb 7, 2025Updated last year
- Welcome to the SEKOIA.IO Community repository!☆178Feb 6, 2026Updated 3 weeks ago
- This is a little plugin to copy disassembly in a way that is usable in YARA rules!☆48Apr 14, 2025Updated 10 months ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Dec 14, 2018Updated 7 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Reproducible Analytical Pipeline of the Hospital Standardised Mortality Ratio (HSMR) quarterly publication☆11Jun 21, 2024Updated last year
- ☆13Mar 28, 2024Updated last year
- ☆11Apr 25, 2021Updated 4 years ago
- Bash & Python scripts for daily life☆16Nov 27, 2018Updated 7 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 8 years ago
- ☆10May 8, 2018Updated 7 years ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- Artificial Dog to bark at deer and other garden pests using Raspberry Pi and Groundlight☆12Jun 19, 2024Updated last year