the2dl / chronicle_detection_publicView external linksLinks
Public Chronicle Detection Rules
☆12Apr 25, 2023Updated 2 years ago
Alternatives and similar repositories for chronicle_detection_public
Users that are interested in chronicle_detection_public are comparing it to the libraries listed below
Sorting:
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- Collection of my own detection rules☆20Jan 6, 2026Updated last month
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- Yara Rules for Modern Malware☆78Mar 3, 2024Updated last year
- VirusTotal Intelligence Search☆40May 21, 2020Updated 5 years ago
- An easy-to-install ChatGPT clone you can host on your own web server and access from a web browser.☆10May 26, 2023Updated 2 years ago
- A guide on how to write fast and memory friendly YARA rules☆164Feb 11, 2025Updated last year
- Simple AutoIt crypter.☆11Mar 3, 2017Updated 8 years ago
- ☆45Dec 2, 2025Updated 2 months ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Microsoft-Defender-for-IoT☆14May 26, 2025Updated 8 months ago
- A Sublime Text 2 Plugin that can generate a sequence of numbers using search and replace.☆28Sep 29, 2019Updated 6 years ago
- Portfolio website.☆10Nov 29, 2023Updated 2 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- Conan extension☆10Sep 20, 2025Updated 4 months ago
- Binary exploitation exercises and scripts☆12Mar 15, 2022Updated 3 years ago
- A library to simplify proxy usage in .NET☆10Oct 6, 2023Updated 2 years ago
- Reverse Engineering the Tabstate files for Windows Notepad☆10May 1, 2024Updated last year
- Like the British said☆12Nov 15, 2023Updated 2 years ago
- ☆10Jan 13, 2026Updated last month
- Provides bitcoin cash-specific convenience functions and types☆11Dec 5, 2025Updated 2 months ago
- OSCP preparation☆12Sep 18, 2025Updated 4 months ago
- Rio Grande Games' Dominion☆27Nov 18, 2010Updated 15 years ago
- Compiled executables of common crypto and encoding algorithms☆16Oct 3, 2023Updated 2 years ago
- Notes some analysis related to VidarStealer sample☆17May 5, 2024Updated last year
- ☆10Mar 31, 2021Updated 4 years ago
- ☆10Aug 15, 2022Updated 3 years ago
- 一个简单的 稳定 ICMP 传输 示例,在公网中传输可能有点慢,但很稳定,适合初学者☆11Mar 9, 2022Updated 3 years ago
- Python script for downloading wetransfer files (https://www.wetransfer.com/) in command line mode☆10Apr 7, 2021Updated 4 years ago
- Frida depends on Vala☆11Jun 29, 2025Updated 7 months ago
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- Javascripts Deobfuscator. Used to debug obfuscated JS from obfuscator.io and other obfuscate tools.☆10Oct 25, 2023Updated 2 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- ☆11Jun 22, 2020Updated 5 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆17Oct 8, 2016Updated 9 years ago
- Modded version of KoiVM☆12Aug 17, 2019Updated 6 years ago
- Binary Ninja Plugin for RISC-V☆14Nov 29, 2023Updated 2 years ago
- Fixed 2025 version of Mega Dumper with 64 bit and generic PE support. It can solve Enigma Latest (7.90)☆25Dec 27, 2025Updated last month
- ☆14Sep 24, 2012Updated 13 years ago