umair9747 / yara-rules
This repository contains a list of known YARA rules which researchers can use according to their needs.The repository is opensource and can be used by the end users as long as they follow the GNU GENERAL PUBLIC LICENSE V3.
☆8Updated 2 years ago
Alternatives and similar repositories for yara-rules:
Users that are interested in yara-rules are comparing it to the libraries listed below
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆18Updated 2 years ago
- ☆19Updated last year
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- Nexus of Android banking Trojans☆15Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- Collection of videos of Raids on Cybercriminals☆19Updated 2 weeks ago
- An automated e-mail OSINT tool☆20Updated 2 years ago
- Hashes of infamous malware☆26Updated last year
- Ransomware for demonstration☆15Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- A tool designed to analyse email headers☆33Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆48Updated last year
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated 11 months ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆21Updated 2 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- Ransomware groups posts☆38Updated this week
- ☆17Updated last year
- A network logging tool that logs per process activities☆32Updated last year
- Retrieve all mails of users related to a git repository, a git user or a git organization☆47Updated 11 months ago
- A series of python scripts to extract information from Dark Web Applications☆12Updated last week
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- New Framework Red Team Operations☆17Updated 3 years ago
- Cookie - Phishing - Altri strumenti utili - Rendersi Anonimi nel WEB - Messaggistica Sicura☆21Updated 10 months ago