Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules
☆144Mar 4, 2026Updated this week
Alternatives and similar repositories for defender2yara
Users that are interested in defender2yara are comparing it to the libraries listed below
Sorting:
- Extracted Yara rules from Windows Defender mpavbase and mpasbase☆498Dec 22, 2025Updated 2 months ago
- defender_database☆24Oct 31, 2023Updated 2 years ago
- ☆59Oct 17, 2024Updated last year
- ☆31Feb 28, 2025Updated last year
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆382Dec 13, 2024Updated last year
- Collect Windows telemetry for Maldev☆460Jan 30, 2026Updated last month
- A basic C2 framework written in C☆59Jul 7, 2024Updated last year
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Jun 6, 2024Updated last year
- Extracted lua script from Defender mpavbase.vdm and mpasbase.vdm☆16Jul 5, 2024Updated last year
- Call Stack Spoofing for Rust☆210Jan 28, 2026Updated last month
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆41Jul 29, 2025Updated 7 months ago
- Implant drop-in for EDR testing☆147Nov 15, 2023Updated 2 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,317Nov 12, 2025Updated 3 months ago
- a tiny program to consume from ETW providers for research☆54Jan 4, 2025Updated last year
- string encryption in Nim☆20Jun 15, 2024Updated last year
- Convert Microsoft Defender Antivirus Signatures (VDM) into a SQL DB☆24Jun 27, 2025Updated 8 months ago
- A reflective DLL development template for the Rust programming language☆116Nov 4, 2025Updated 4 months ago
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 10 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆129Oct 4, 2024Updated last year
- find dll base addresses without PEB WALK☆161Jul 13, 2025Updated 7 months ago
- A lexer and parser for Sleep☆20Feb 20, 2026Updated 2 weeks ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆75Jan 3, 2025Updated last year
- Simple C# Redirector☆94Aug 31, 2025Updated 6 months ago
- A Payload Analysis Framework☆117Oct 9, 2025Updated 5 months ago
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆459Aug 2, 2024Updated last year
- ☆125Jun 28, 2023Updated 2 years ago
- A simple Sleepmask BOF example☆169Nov 24, 2025Updated 3 months ago
- An example reference design for a proposed BOF PE☆201Jan 23, 2026Updated last month
- Analyse your malware to surgically obfuscate it☆520Dec 17, 2025Updated 2 months ago
- Process injection alternative☆407Sep 6, 2024Updated last year
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 7 months ago
- Proof-of-concept implementation of AI-enabled postex DLLs☆54Sep 10, 2025Updated 5 months ago
- A Reflective Loader for macOS☆147Jul 20, 2025Updated 7 months ago
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆541Feb 13, 2024Updated 2 years ago
- Sleep obfuscation☆270Dec 13, 2024Updated last year
- Dynamically invoke arbitrary unmanaged code☆358Feb 19, 2026Updated 2 weeks ago