Yara RulesRepository of YARA rules made by McAfee ATR Team
Stars: ✭ 283 (-59.63%)
PetoolsPE Tools - Portable executable (PE) manipulation toolkit
Stars: ✭ 528 (-24.68%)
Cyberchef RecipesA list of cyber-chef recipes and curated links
Stars: ✭ 619 (-11.7%)
Malware SamplesA collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net
Stars: ✭ 565 (-19.4%)
WdbgarkWinDBG Anti-RootKit Extension
Stars: ✭ 450 (-35.81%)
Hosts🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.
Stars: ✭ 19,363 (+2662.2%)
ThreatKBKnowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)
Stars: ✭ 68 (-90.3%)
TwitterSearch2GephiThis windows CLI app lets you collect data from twitter via REST API and convert it into a CSV data set that can be used with Gephi. Other social networks (Reddit, Youtube, WWW) are also supported.
Stars: ✭ 21 (-97%)
hypotheticalHypothesis and statistical testing in Python
Stars: ✭ 49 (-93.01%)
MaltrailMalicious traffic detection system
Stars: ✭ 4,296 (+512.84%)
HyaraYara rule making tool (IDA Pro & Binary Ninja & Cutter Plugin)
Stars: ✭ 142 (-79.74%)
YtMain yt repository
Stars: ✭ 279 (-60.2%)
swisscheeseExploits for YARA 3.7.1 & 3.8.1
Stars: ✭ 26 (-96.29%)
CortexCortex: a Powerful Observable Analysis and Active Response Engine
Stars: ✭ 676 (-3.57%)
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (-89.3%)
jacoco-reportGithub action that publishes the JaCoCo report as a comment in the Pull Request
Stars: ✭ 31 (-95.58%)
FclFCL (Fileless Command Lines) - Known command lines of fileless malicious executions
Stars: ✭ 409 (-41.65%)
PyPackerDetectA malware dataset curation tool which helps identify packed samples.
Stars: ✭ 27 (-96.15%)
QiimeOfficial QIIME 1 software repository. QIIME 2 (https://qiime2.org) has succeeded QIIME 1 as of January 2018.
Stars: ✭ 272 (-61.2%)
MemzA trojan made for Danooct1's User Made Malware Series.
Stars: ✭ 524 (-25.25%)
Bold-Falcon毕方智能云沙箱(Bold-Falcon)是一个开源的自动化恶意软件分析系统;方班网络安全综合实验-设计类;
Stars: ✭ 30 (-95.72%)
ArachniWeb Application Security Scanner Framework
Stars: ✭ 2,942 (+319.69%)
rkorovald_preload userland rootkit
Stars: ✭ 34 (-95.15%)
BinserveA blazingly fast static web server with routing, templating, and security in a single binary you can set up with zero code. ⚡️🦀
Stars: ✭ 401 (-42.8%)
Data Describedata⎰describe: Pythonic EDA Accelerator for Data Science
Stars: ✭ 269 (-61.63%)
Password Generator🔄 Simple password generator class library in C# 6.0, use for generate your own password! 📗
Stars: ✭ 21 (-97%)
AmberReflective PE packer.
Stars: ✭ 594 (-15.26%)
ldap2jsonThe ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.
Stars: ✭ 56 (-92.01%)
InfectpeInfectPE - Inject custom code into PE file [This project is not maintained anymore]
Stars: ✭ 266 (-62.05%)
FinquantA program for financial portfolio management, analysis and optimisation.
Stars: ✭ 395 (-43.65%)
MsfManiaPython AV Evasion Tools
Stars: ✭ 388 (-44.65%)
Remot3dRemot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors
Stars: ✭ 263 (-62.48%)
sp-metadata🔬 SharePoint Metadata Tracker
Stars: ✭ 12 (-98.29%)
Dexcalibur[Official] Android reverse engineering tool focused on dynamic instrumentation automation. Powered by Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods, stores intercepted data and does new things from it. Its aim is to be an all-in-one Android reverse engineering platform.
Stars: ✭ 512 (-26.96%)
CommunityVolatility plugins developed and maintained by the community
Stars: ✭ 252 (-64.05%)
yara-validatorValidates yara rules and tries to repair the broken ones.
Stars: ✭ 37 (-94.72%)
Dex OracleA pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis
Stars: ✭ 398 (-43.22%)
btbinary toolkit
Stars: ✭ 12 (-98.29%)
detectionDetection in the form of Yara, Snort and ClamAV signatures.
Stars: ✭ 70 (-90.01%)
pihole-blocklistsDomain blocklists for Pi-Hole that are free and open for use by everyone.
Stars: ✭ 13 (-98.15%)
TeleShadow2TeleShadow - Telegram Desktop Session Stealer (Windows)
Stars: ✭ 88 (-87.45%)
mem64Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.
Stars: ✭ 26 (-96.29%)
PandapowerConvenient Power System Modelling and Analysis based on PYPOWER and pandas
Stars: ✭ 387 (-44.79%)
progressivisProgressive Analytics and Visualization
Stars: ✭ 42 (-94.01%)
quality-requirementsBeispiele für Qualitätsanforderungen an Software (etwa: Zur Vereinfachung von ATAM-Analysen oder Quality-Driven Software Architecture)
Stars: ✭ 61 (-91.3%)
reserveLightweight http server statically configurable using regular expressions
Stars: ✭ 19 (-97.29%)
DdisasmA fast and accurate disassembler
Stars: ✭ 325 (-53.64%)
Dr0pFiUsing this tool, You can capture all WiFi Passwords stored on Windows Computer and mail them to your email account!
Stars: ✭ 38 (-94.58%)
astroBuild fast websites, faster. 🚀🧑🚀✨
Stars: ✭ 11,024 (+1472.61%)