Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control Nodes
☆22Jul 14, 2019Updated 6 years ago
Alternatives and similar repositories for Absolutely-Positively-NOT-Hacking-Back-with-Pcap
Users that are interested in Absolutely-Positively-NOT-Hacking-Back-with-Pcap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 3 years ago
- View contents of Visual Studio SUO files☆23Apr 23, 2026Updated 2 weeks ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆18Oct 7, 2016Updated 9 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆50Jan 13, 2020Updated 6 years ago
- Yara rules written by me, for free use.☆20Nov 26, 2021Updated 4 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- Scripts and lists to help generate YARA friendly string mutations☆22Apr 9, 2023Updated 3 years ago
- A simple many-rules to many-files YARA scanner for incident response or malware zoos.☆27Jun 3, 2018Updated 7 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆23Dec 18, 2024Updated last year
- Yara rules for detecting malware☆23Sep 9, 2025Updated 7 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Windows GPU rootkit PoC by Team Jellyfish☆22Jul 2, 2015Updated 10 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- An active domain name query tool to help keep track of domain name movements...☆16Mar 28, 2021Updated 5 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆37Mar 15, 2023Updated 3 years ago
- first commit☆24Feb 16, 2026Updated 2 months ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- Your best is still an idiot.☆10Sep 24, 2021Updated 4 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Sep 21, 2022Updated 3 years ago
- Putting the Sauce in CyberChef - making CyberChef automatable☆19Feb 18, 2026Updated 2 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Create an entire YARA rule via Python? Whhhhhhaatttt?☆74Jan 12, 2019Updated 7 years ago
- service location protocol amplified denial of service attack verification tool☆16Apr 25, 2023Updated 3 years ago
- A small, unfinished utility to browse and download NirSoft programs.☆17Jun 14, 2020Updated 5 years ago
- Go API to interact with radare2☆36Jan 15, 2026Updated 3 months ago
- A collection of shellcode hashes☆17Aug 15, 2018Updated 7 years ago
- Collection of my own detection rules☆20Jan 6, 2026Updated 4 months ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Dec 19, 2018Updated 7 years ago
- Static code search python lib☆18Oct 27, 2020Updated 5 years ago
- A Yara Lua output script for Suricata☆20Apr 7, 2019Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- ☆45Dec 2, 2025Updated 5 months ago
- This is a little plugin to copy disassembly in a way that is usable in YARA rules!☆48Apr 14, 2025Updated last year
- A golang CLI tool to download malware from a variety of sources.☆151Jul 3, 2025Updated 10 months ago
- USN to JSON☆22Apr 4, 2020Updated 6 years ago
- Powershell sandboxing utility☆19Mar 2, 2026Updated 2 months ago
- Collection of configuration files that can be used as good starting points to secure different services and tools☆17Mar 22, 2026Updated last month