Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules
☆150Mar 23, 2026Updated last week
Alternatives and similar repositories for defender2yara
Users that are interested in defender2yara are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- defender_database☆25Oct 31, 2023Updated 2 years ago
- Extracted Yara rules from Windows Defender mpavbase and mpasbase☆504Dec 22, 2025Updated 3 months ago
- ☆59Oct 17, 2024Updated last year
- ☆31Feb 28, 2025Updated last year
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Extracted lua script from Defender mpavbase.vdm and mpasbase.vdm☆16Jul 5, 2024Updated last year
- Collect Windows telemetry for Maldev☆465Jan 30, 2026Updated 2 months ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆384Dec 13, 2024Updated last year
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- A basic C2 framework written in C☆59Jul 7, 2024Updated last year
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆42Jul 29, 2025Updated 8 months ago
- a tiny program to consume from ETW providers for research☆55Jan 4, 2025Updated last year
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆133Oct 4, 2024Updated last year
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,334Nov 12, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A lexer and parser for Sleep☆20Feb 20, 2026Updated last month
- Call Stack Spoofing for Rust☆212Jan 28, 2026Updated 2 months ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into a SQL DB☆24Jun 27, 2025Updated 9 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Jun 6, 2024Updated last year
- ☆125Jun 28, 2023Updated 2 years ago
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 8 months ago
- Implant drop-in for EDR testing☆147Nov 15, 2023Updated 2 years ago
- Simple C# Redirector☆94Aug 31, 2025Updated 6 months ago
- A simple Sleepmask BOF example☆173Nov 24, 2025Updated 4 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- find dll base addresses without PEB WALK☆162Jul 13, 2025Updated 8 months ago
- Scripts to interact with Microsoft Graph APIs☆45Nov 7, 2024Updated last year
- Analyse your malware to surgically obfuscate it☆524Dec 17, 2025Updated 3 months ago
- An example reference design for a proposed BOF PE☆204Jan 23, 2026Updated 2 months ago
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆544Feb 13, 2024Updated 2 years ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 11 months ago
- early cascade injection PoC based on Outflanks blog post, in rust☆62Nov 8, 2024Updated last year
- Sleep obfuscation☆272Dec 13, 2024Updated last year
- Process injection alternative☆407Sep 6, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A reflective DLL development template for the Rust programming language☆117Nov 4, 2025Updated 4 months ago
- A COFF Loader written in Rust☆140Dec 1, 2025Updated 3 months ago
- string encryption in Nim☆19Jun 15, 2024Updated last year
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆618Jan 2, 2025Updated last year
- ☆182Apr 24, 2025Updated 11 months ago
- bof-launcher - a library for loading, executing and in-memory masking BOFs on Windows (x64, x86) and Linux (x64, x86, aarch64, arm). Read…☆307Mar 20, 2026Updated last week
- Collection of extracted Microsoft Defender data for security research purposes☆235Jun 23, 2022Updated 3 years ago