There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Loki
Loki - Simple IOC and YARA Scannersignature-base
YARA signature and IOC database for my scanners and toolsyarGen
yarGen is a generator for YARA rulesauditd
Best Practice Auditd ConfigurationRaccine
A Simple Ransomware Vaccinemunin
Online hash checker for Virustotal and other serviceslog4shell-detector
Detector for Log4Shell exploitation attemptsFenrir
Simple Bash IOC ScanneryarAnalyzer
Yara Rule Analyzer and Statisticsvti-dorks
Awesome VirusTotal Intelligence Search QueriesFnord
Pattern Extractor for Obfuscated CodeBlueLedger
A list of my personal projectsDLLRunner
Smart DLL execution for malware analysis in sandbox systemsgod-mode-rules
God Mode Detection RulesYARA-Performance-Guidelines
A guide on how to write fast and memory friendly YARA rulesevt2sigma
Log Entry to Sigma Rule ConverteryaraQA
YARA rule analyzer to improve rule quality and performanceCyber-Search-Shortcuts
Browser Shortcuts for Cyber Security Related Online Servicesexotron
Sandbox feature upgrade with the help of wrapped samplesLoki2
LOKI2 - Simple IOC and YARA ScannerImpHash-Generator
PE Import Hash GeneratorRewind
Immediate Virus Infection Counter Measuresradiocarbon
Leak File Analyzertiny-shells
All kinds of tiny shellspanopticon
A YARA Rule Performance Measurement ToolLOLSecIssues
Cybersecurity's lighter side: a collection of the most amusing misunderstandings and missteps from newcomers to offensive security tools. A repository where naiveté in infosec is met with humor.ti-falsepositives
A collection of typical false positive indicatorswebshell-intel
Scan web server for known webshell names and responsesxorex
XOR Key ExtractorTalks
Slides of my public talkscyber-chef-recipes
Recipes for GCHQ's CyberChef Web Appsysmon-version-history
An Inofficial Sysmon Version History (Change Log)littlesnitch-log-exporter
LittleSnitch Log Statistics ExporterYARA-Style-Guide
A specification and style guide for YARA rulesSkeletonKeyScanner
Scanner for the SkeletonKey MalwareThreatResearch-Reporting-Guide
Offensive Research Guide to Help Defense Improve Detectionprisma
Command Line STDOUT ColorerReginScanner
Scanner for Regin Virtual Filesystemsspace-id
Invisible Watermarks with Space Characters in ASCII Filesneolog
Windows Syslog Command Line Clientyara-uuid-generator
A tool that adds reproducible UUIDs to YARA rulesWPWatcher
Wordpress Watcher is a wrapper for WPScan that manages scans on multiple sites and reports by emaildefensive-project-ideas
Ideas for projects for defensive research or blue teamingagile-hacking
Collection of hacks that make use of the least available on victim systemsCredsSpreader
A tool to spread canary credentials in your organisationlanguage-thor
Syntax Theme for THOR APT Scanner log filesyara-type-selectors
YARA rules to certain types of files without using YARA modules to avoid the performance impactPassTweaker
Tweaks password files to match modern password requirementsspeedy
(Demo) - Only used to demonstrate a memory leak caused by Golang regexploki-cloud
A flexible and lightweight way to execute LOKI on end systemsimphash-go
Imphash GeneratorLove Open Source and this site? Check out how you can help us