YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.
☆45Nov 7, 2023Updated 2 years ago
Alternatives and similar repositories for yarasploit
Users that are interested in yarasploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Monitor and prevent unexpected behavior of Java programs.☆14Jul 6, 2021Updated 4 years ago
- Socks 5 proxy☆12Aug 5, 2023Updated 2 years ago
- study launch anywhere and bundle mismatch bug☆17Apr 23, 2023Updated 2 years ago
- All4Cod is a text editor/IDE written in Delphi☆14Jul 9, 2021Updated 4 years ago
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 9 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Beacon.dll reverse☆141Sep 5, 2021Updated 4 years ago
- ☆14Oct 5, 2019Updated 6 years ago
- Some debug notes and exploit(not blind)☆39Jul 28, 2019Updated 6 years ago
- ☆10Nov 5, 2018Updated 7 years ago
- ☆98Oct 7, 2020Updated 5 years ago
- web sensitive information recognition module☆21Nov 27, 2025Updated 4 months ago
- OwOwning with the Windows API Examples and Code. DEFCON Furs 2020 presentation.☆13Jan 18, 2024Updated 2 years ago
- IDA Python's idc.py <= 7.3 compatibility module☆21Oct 11, 2019Updated 6 years ago
- ☆28Apr 1, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- huaweictf2020-xctf高校网络安全挑战赛☆17Dec 28, 2020Updated 5 years ago
- 《横向移动攻击与检测技术》专栏文章☆17Sep 5, 2019Updated 6 years ago
- Use Windows Management Instrumentation interfaces to perform actions on a Windows system from a Linux System☆16Mar 15, 2012Updated 14 years ago
- Network monitor for Linux☆13Aug 11, 2019Updated 6 years ago
- Python implementation of LFSR and Berlekamp-Massey algorithm.☆17Feb 29, 2020Updated 6 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- stupid ptrace tricks☆12May 19, 2021Updated 4 years ago
- ☆16Jul 25, 2023Updated 2 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆14Jul 28, 2018Updated 7 years ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- cve-2019-0604 SharePoint RCE exploit☆40Jun 26, 2019Updated 6 years ago
- 🐶Cobalt Strike Shellcode Loader by Golang☆283Apr 22, 2021Updated 4 years ago
- Tools for auditing WAFS☆19Feb 25, 2022Updated 4 years ago
- TweetTrace is a free and open-source Chrome extension that records tweets you visit, providing seamless search and filtering functionalit…☆23Aug 22, 2024Updated last year
- ☆16Jun 9, 2023Updated 2 years ago
- Fetch PDB symbols directly from Microsoft's symbol servers☆48Oct 22, 2025Updated 5 months ago
- Yara Dockerfile☆50Oct 3, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Web ExternalC2 Demo☆52Aug 18, 2020Updated 5 years ago
- Aggressor Script to Execute Assemblies from Github☆71Nov 30, 2020Updated 5 years ago
- 使用qml开发的一款模仿网易云音乐的播放器☆15Oct 11, 2018Updated 7 years ago
- Yet another variant of Process Hollowing☆461Jul 31, 2025Updated 7 months ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆190Oct 21, 2020Updated 5 years ago
- A collection of Windows Administrator tools☆18Jan 1, 2014Updated 12 years ago
- ☆11Nov 25, 2020Updated 5 years ago