umair9747 / yara-rulesLinks
This repository contains a list of known YARA rules which researchers can use according to their needs.The repository is opensource and can be used by the end users as long as they follow the GNU GENERAL PUBLIC LICENSE V3.
☆8Updated 2 years ago
Alternatives and similar repositories for yara-rules
Users that are interested in yara-rules are comparing it to the libraries listed below
Sorting:
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- Nexus of Android banking Trojans☆15Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated 11 months ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆21Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- ☆17Updated 2 years ago
- Enumeration & fingerprint tool☆25Updated last year
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 11 months ago
- Collection of videos of Raids on Cybercriminals☆19Updated 3 months ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- Hashes of infamous malware☆26Updated last year
- Ransomware for demonstration☆17Updated 2 years ago
- Capture screenshots of onion services on an onion service.☆49Updated last year
- Simple Tool for webhacking☆11Updated 2 years ago
- New Framework Red Team Operations☆18Updated 4 years ago
- web application pentesting tools for docker☆18Updated 2 years ago
- Files for my Python3 Create Your Own Tool Series☆25Updated 2 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 3 years ago
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- Red Teaming Tactics and Techniques☆14Updated 3 years ago
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆35Updated 4 years ago
- Simple passive Python Recon tool for subdomains enumeration with crt.sh☆20Updated 3 years ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- A network logging tool that logs per process activities☆32Updated 2 years ago
- C2Matrix Automation☆11Updated last year