umair9747 / yara-rules
This repository contains a list of known YARA rules which researchers can use according to their needs.The repository is opensource and can be used by the end users as long as they follow the GNU GENERAL PUBLIC LICENSE V3.
☆8Updated 2 years ago
Alternatives and similar repositories for yara-rules:
Users that are interested in yara-rules are comparing it to the libraries listed below
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 9 months ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆22Updated 9 months ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- Nexus of Android banking Trojans☆15Updated last year
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆31Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆19Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆11Updated 2 years ago
- Ransomware for demonstration☆15Updated 2 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated 8 months ago
- A tool designed to analyse email headers☆33Updated 2 years ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆16Updated 9 months ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆16Updated 3 years ago
- VLAN attacks toolkit☆14Updated 2 years ago
- Rust Weaponization for Red Team Engagements.☆11Updated 2 years ago
- A network logging tool that logs per process activities☆32Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆16Updated 8 months ago
- ☆20Updated last year
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆13Updated 4 months ago
- Simple Tool for webhacking☆11Updated 2 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆13Updated last year
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated 11 months ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- Hashes of infamous malware☆26Updated last year