Rules Shared by the Community from 100 Days of YARA 2023 -
☆18Apr 10, 2023Updated 2 years ago
Alternatives and similar repositories for DaysOfYARA-2023
Users that are interested in DaysOfYARA-2023 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Aug 11, 2018Updated 7 years ago
- ☆17Sep 10, 2021Updated 4 years ago
- Provides an easy way to collect and send Slack access & integration logs.☆13Oct 19, 2021Updated 4 years ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- Exploit for CVE-2023-38571☆13Sep 27, 2023Updated 2 years ago
- Tools for automating the definition of a quiz at web sites such as Kahoot, Google forms, JotForm.☆11Jun 29, 2015Updated 10 years ago
- ☆15Jun 27, 2024Updated last year
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 4 years ago
- A ruleset to find potentially malicious code in macOS malware samples☆41Aug 29, 2023Updated 2 years ago
- Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.☆12Nov 15, 2022Updated 3 years ago
- Tool for generating Memory.scan() compatible instruction search patterns☆14Jul 29, 2022Updated 3 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- A collection of Apple-related CTF writeups☆15Jan 17, 2022Updated 4 years ago
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆23Apr 16, 2025Updated 11 months ago
- Turning Your Computer Into a GPS Tracker With Apple Maps☆18Feb 6, 2024Updated 2 years ago
- An Ubuntu 18.04 box for Mythic C2 framework development☆17Jun 17, 2022Updated 3 years ago
- shared samples from #dailyphish and/or #apt tweets☆41Sep 3, 2025Updated 6 months ago
- Detect common classes of XPC exploits☆16Updated this week
- A Visual Studio Code Extension agent for Mythic C2☆72Nov 5, 2024Updated last year
- Forblaze - A Python Mac Steganography Payload Generator☆56Mar 7, 2022Updated 4 years ago
- Manage attack surface data on Elasticsearch☆25Nov 20, 2023Updated 2 years ago
- a Ruby implementation of Java's ObjectInputStream and ObjectOutputStream.☆16May 28, 2022Updated 3 years ago
- Solutions from @PortSwigger labs☆13Apr 11, 2024Updated last year
- ☆28Apr 4, 2023Updated 2 years ago
- ☆15Mar 15, 2026Updated last week
- A shell script to download malware domains from various sources, and configuring unbound DNS config file to be used as a local recursive …☆19Sep 12, 2014Updated 11 years ago
- Objective-C runtime library wrapper for Nim☆19Jun 7, 2017Updated 8 years ago
- A Rust library along with a Win32 GUI application to determine the driver load order of a Windows system (cf. https://colinfinck.de/posts…☆12Jan 26, 2025Updated last year
- Discover which process execute a hunted binary inside macOS☆27Dec 15, 2021Updated 4 years ago
- A small library for displaying notifications☆17Mar 8, 2018Updated 8 years ago
- A CLI tool for leveraging IDP signing keys to impersonate users and groups☆19Apr 1, 2021Updated 4 years ago
- ☆33Oct 16, 2025Updated 5 months ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- Webshell agent in aspx and php☆27Dec 11, 2025Updated 3 months ago
- POC about how to prevent windbg break☆15Oct 3, 2022Updated 3 years ago
- ☆18Mar 26, 2024Updated last year
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆61Aug 4, 2022Updated 3 years ago