Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules
☆185Apr 13, 2026Updated this week
Alternatives and similar repositories for defender2yara
Users that are interested in defender2yara are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- defender_database☆25Oct 31, 2023Updated 2 years ago
- Extracted Yara rules from Windows Defender mpavbase and mpasbase☆517Dec 22, 2025Updated 3 months ago
- ☆59Oct 17, 2024Updated last year
- ☆31Feb 28, 2025Updated last year
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Extracted lua script from Defender mpavbase.vdm and mpasbase.vdm☆16Jul 5, 2024Updated last year
- Collect Windows telemetry for Maldev☆469Jan 30, 2026Updated 2 months ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆384Dec 13, 2024Updated last year
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- A basic C2 framework written in C☆59Jul 7, 2024Updated last year
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆42Jul 29, 2025Updated 8 months ago
- a tiny program to consume from ETW providers for research☆55Jan 4, 2025Updated last year
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆133Oct 4, 2024Updated last year
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,347Nov 12, 2025Updated 5 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A lexer and parser for Sleep☆20Feb 20, 2026Updated last month
- Convert Microsoft Defender Antivirus Signatures (VDM) into a SQL DB☆24Jun 27, 2025Updated 9 months ago
- Call Stack Spoofing for Rust☆213Jan 28, 2026Updated 2 months ago
- A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strike☆217Apr 11, 2026Updated last week
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Jun 6, 2024Updated last year
- ☆131Jun 28, 2023Updated 2 years ago
- One-header configurable C++20 COFF loader☆19Jul 21, 2025Updated 8 months ago
- Implant drop-in for EDR testing☆147Nov 15, 2023Updated 2 years ago
- Simple C# Redirector☆94Aug 31, 2025Updated 7 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A simple Sleepmask BOF example☆172Nov 24, 2025Updated 4 months ago
- find dll base addresses without PEB WALK☆161Jul 13, 2025Updated 9 months ago
- Scripts to interact with Microsoft Graph APIs☆45Nov 7, 2024Updated last year
- Analyse your malware to surgically obfuscate it☆527Dec 17, 2025Updated 4 months ago
- An example reference design for a proposed BOF PE☆206Jan 23, 2026Updated 2 months ago
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆547Feb 13, 2024Updated 2 years ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated last year
- early cascade injection PoC based on Outflanks blog post, in rust☆62Nov 8, 2024Updated last year
- Sleep obfuscation☆273Dec 13, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Process injection alternative☆407Sep 6, 2024Updated last year
- A reflective DLL development template for the Rust programming language☆119Nov 4, 2025Updated 5 months ago
- A COFF Loader written in Rust☆141Dec 1, 2025Updated 4 months ago
- string encryption in Nim☆19Jun 15, 2024Updated last year
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆622Jan 2, 2025Updated last year
- ☆183Apr 24, 2025Updated 11 months ago
- Collection of extracted Microsoft Defender data for security research purposes☆237Jun 23, 2022Updated 3 years ago