t-tani / defender2yaraView external linksLinks
Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules
☆142Updated this week
Alternatives and similar repositories for defender2yara
Users that are interested in defender2yara are comparing it to the libraries listed below
Sorting:
- Extracted Yara rules from Windows Defender mpavbase and mpasbase☆494Dec 22, 2025Updated last month
- defender_database☆24Oct 31, 2023Updated 2 years ago
- ☆59Oct 17, 2024Updated last year
- ☆31Feb 28, 2025Updated 11 months ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆381Dec 13, 2024Updated last year
- Collect Windows telemetry for Maldev☆455Jan 30, 2026Updated 2 weeks ago
- A basic C2 framework written in C☆59Jul 7, 2024Updated last year
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Jun 6, 2024Updated last year
- Extracted lua script from Defender mpavbase.vdm and mpasbase.vdm☆16Jul 5, 2024Updated last year
- Call Stack Spoofing for Rust☆210Jan 28, 2026Updated 2 weeks ago
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆39Jul 29, 2025Updated 6 months ago
- Implant drop-in for EDR testing☆147Nov 15, 2023Updated 2 years ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,307Nov 12, 2025Updated 3 months ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- a tiny program to consume from ETW providers for research☆54Jan 4, 2025Updated last year
- A reflective DLL development template for the Rust programming language☆113Nov 4, 2025Updated 3 months ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into a SQL DB☆24Jun 27, 2025Updated 7 months ago
- string encryption in Nim☆20Jun 15, 2024Updated last year
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- find dll base addresses without PEB WALK☆157Jul 13, 2025Updated 7 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 10 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆128Oct 4, 2024Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Jan 3, 2025Updated last year
- A lexer and parser for Sleep☆20May 14, 2025Updated 9 months ago
- Simple C# Redirector☆93Aug 31, 2025Updated 5 months ago
- A Payload Analysis Framework☆116Oct 9, 2025Updated 4 months ago
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆457Aug 2, 2024Updated last year
- ☆126Jun 28, 2023Updated 2 years ago
- A simple Sleepmask BOF example☆167Nov 24, 2025Updated 2 months ago
- An example reference design for a proposed BOF PE☆197Jan 23, 2026Updated 3 weeks ago
- Analyse your malware to surgically obfuscate it☆517Dec 17, 2025Updated last month
- Process injection alternative☆404Sep 6, 2024Updated last year
- Proof-of-concept implementation of AI-enabled postex DLLs☆54Sep 10, 2025Updated 5 months ago
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 6 months ago
- A Reflective Loader for macOS☆146Jul 20, 2025Updated 6 months ago
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆539Feb 13, 2024Updated 2 years ago
- Sleep obfuscation☆267Dec 13, 2024Updated last year
- Dynamically invoke arbitrary unmanaged code☆358Nov 20, 2024Updated last year