umair9747 / yara-rules
This repository contains a list of known YARA rules which researchers can use according to their needs.The repository is opensource and can be used by the end users as long as they follow the GNU GENERAL PUBLIC LICENSE V3.
☆8Updated 2 years ago
Alternatives and similar repositories for yara-rules:
Users that are interested in yara-rules are comparing it to the libraries listed below
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 7 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆38Updated last year
- A tool designed to analyse email headers☆33Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated 11 months ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- ☆18Updated last year
- Simple passive Python Recon tool for subdomains enumeration with crt.sh☆18Updated 2 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆24Updated 9 months ago
- Tactics, Techniques, and Procedures☆25Updated last month
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated 11 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆11Updated 2 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- Capture screenshots of onion services on an onion service.☆50Updated 8 months ago
- Ransomware groups posts☆38Updated this week
- VLAN attacks toolkit☆13Updated 2 years ago
- Nexus of Android banking Trojans☆15Updated last year
- A network logging tool that logs per process activities☆32Updated last year
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- New Framework Red Team Operations☆17Updated 3 years ago
- Simple Tool for webhacking☆11Updated last year
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- An automated e-mail OSINT tool☆20Updated 2 years ago
- RATs library 2003 to present☆12Updated last year
- Retrieve all mails of users related to a git repository, a git user or a git organization☆46Updated 9 months ago
- Internal Network Penetration Test Playbook☆19Updated 3 years ago
- Virus Total Free - IOC parser and report generator☆23Updated last year