There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Loki
Loki - Simple IOC and YARA Scannersignature-base
YARA signature and IOC database for my scanners and toolsyarGen
yarGen is a generator for YARA rulesauditd
Best Practice Auditd ConfigurationRaccine
A Simple Ransomware Vaccinemunin
Online hash checker for Virustotal and other serviceslog4shell-detector
Detector for Log4Shell exploitation attemptsFenrir
Simple Bash IOC ScanneryarAnalyzer
Yara Rule Analyzer and Statisticsvti-dorks
Awesome VirusTotal Intelligence Search QueriesFnord
Pattern Extractor for Obfuscated CodeBlueLedger
A list of my personal projectsDLLRunner
Smart DLL execution for malware analysis in sandbox systemsgod-mode-rules
God Mode Detection RulesYARA-Performance-Guidelines
A guide on how to write fast and memory friendly YARA rulesevt2sigma
Log Entry to Sigma Rule ConverteryaraQA
YARA rule analyzer to improve rule quality and performanceCyber-Search-Shortcuts
Browser Shortcuts for Cyber Security Related Online Servicesexotron
Sandbox feature upgrade with the help of wrapped samplesImpHash-Generator
PE Import Hash GeneratorLoki2
LOKI2 - Simple IOC and YARA Scannerradiocarbon
Leak File AnalyzerRewind
Immediate Virus Infection Counter Measurespanopticon
A YARA Rule Performance Measurement Tooltiny-shells
All kinds of tiny shellsLOLSecIssues
Cybersecurity's lighter side: a collection of the most amusing misunderstandings and missteps from newcomers to offensive security tools. A repository where naiveté in infosec is met with humor.ti-falsepositives
A collection of typical false positive indicatorswebshell-intel
Scan web server for known webshell names and responsesxorex
XOR Key ExtractorTalks
Slides of my public talkscyber-chef-recipes
Recipes for GCHQ's CyberChef Web Appsysmon-version-history
An Inofficial Sysmon Version History (Change Log)SkeletonKeyScanner
Scanner for the SkeletonKey Malwarelittlesnitch-log-exporter
LittleSnitch Log Statistics Exporterprisma
Command Line STDOUT ColorerThreatResearch-Reporting-Guide
Offensive Research Guide to Help Defense Improve DetectionReginScanner
Scanner for Regin Virtual FilesystemsYARA-Style-Guide
A specification and style guide for YARA rulesspace-id
Invisible Watermarks with Space Characters in ASCII Filesneolog
Windows Syslog Command Line Clientnarsil
Spy Agency Teasingyara-uuid-generator
A tool that adds reproducible UUIDs to YARA rulesWPWatcher
Wordpress Watcher is a wrapper for WPScan that manages scans on multiple sites and reports by emailWindows-Exploit-Suggester
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.agile-hacking
Collection of hacks that make use of the least available on victim systemsCredsSpreader
A tool to spread canary credentials in your organisationlanguage-thor
Syntax Theme for THOR APT Scanner log filesyara-type-selectors
YARA rules to certain types of files without using YARA modules to avoid the performance impactPassTweaker
Tweaks password files to match modern password requirementsspeedy
(Demo) - Only used to demonstrate a memory leak caused by Golang regexploki-cloud
A flexible and lightweight way to execute LOKI on end systemsTrustlookWannaCryToolkit
WannaCryToolkit scanner and removal toolkitimphash-go
Imphash GeneratorLove Open Source and this site? Check out how you can help us