Yara Rules Project View Yara Rules Project
ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring.
Showing 11256 tools • Searched in 3ms
ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring.
YARA syntax highlighting for Gtk-based text editors
TeamTNT is modifying its malicious shell scripts after they were made public by security researchers.
CIFv3 is the next version of the Cyber Intelligence Framework, developed against Ubuntu16, encouraging users to transition from CIFv2.
IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol, with a focus on incident handling automation and threat intelligence processing.
A collection of Yara rules for detecting malware evasion techniques
Interactive incremental disassembler with data/control flow analysis capabilities.
An OSINT tool that generates username lists for companies on LinkedIn for social engineering attacks or security testing purposes.
Scan folders and files for crypto patterns, hacking team malware, and malicious documents using PEID signatures.
Automatic YARA rule generation for malware repositories.
A project with Terraform and Ansible scripts to create an orchestrated BlueTeam Lab for testing attacks and forensic artifacts on Windows environment.
RedEye is a visual analytic tool for enhancing Red and Blue Team operations.
Dynamic binary analysis library with various analysis and emulation capabilities.
A Capture The Flag (CTF) platform for testing computer security skills
Bindings for the Yara library from VirusTotal with support for Yara v4.2 and various features like rule compilation and scanning.
A modified version of Cuckoo Sandbox with enhanced features and capabilities.
Maldatabase is a threat intelligence platform providing malware datasets and threat intelligence feeds for malware data science and threat intelligence.
A front-end JavaScript toolkit for creating DNS rebinding attacks
Hyara is a plugin that simplifies writing YARA rules with various convenient features.
A 32-bit assembler level analyzing debugger for Microsoft Windows.
A tool for injecting and loading executables with a focus on stealth techniques.
Python forensic tool for extracting and analyzing information from Firefox, Iceweasel, and Seamonkey browsers.
Automate the process of writing YARA rules based on executable code within malware.