🔐
keeping things secure
Information Security Practitioner
- Germany
-
05:48
(UTC +02:00) - https://damjanovic.it
Lists (23)
Sort Name ascending (A-Z)
Admin
43 repositories
AI
43 repositories
Blueteam
36 repositories
Cloud
11 repositories
Container
18 repositories
DFIR
22 repositories
Docs
10 repositories
Game
71 repositories
Hardware
155 repositories
IvOS
259 repositories
Logs
8 repositories
Network
52 repositories
Programming
126 repositories
Redteam
58 repositories
Reverse Engineering
17 repositories
Server
34 repositories
Software
158 repositories
Stream
66 repositories
Study
20 repositories
Tui
313 repositories
Virtual Machine
38 repositories
Web
16 repositories
Yara
14 repositories
Stars
- All languages
- ASL
- AppleScript
- Assembly
- Batchfile
- BitBake
- C
- C#
- C++
- CMake
- CSS
- Clojure
- D
- Dart
- Dockerfile
- Elixir
- Emacs Lisp
- GDScript
- GLSL
- Go
- HCL
- HLSL
- HTML
- Haskell
- Haxe
- Inno Setup
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Just
- KakouneScript
- Kotlin
- LLVM
- Lua
- M
- MDX
- Makefile
- Markdown
- Meson
- Nim
- Nix
- OCaml
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- QML
- R
- Rich Text Format
- Roff
- Ruby
- Rust
- SCSS
- Shell
- Svelte
- Swift
- SystemVerilog
- TeX
- TypeScript
- V
- VBScript
- Vala
- Verilog
- Vim Script
- Visual Basic .NET
- Visual Basic 6.0
- Vue
- XSLT
- YAML
- YARA
- Zig
10
stars
written in YARA
Clear filter
YARA signature and IOC database for my scanners and tools
Indicators of Compromises (IOC) of our various investigations
Elastic Security detection content for Endpoint
Extracted Yara rules from Windows Defender mpavbase and mpasbase
YARA Rules I come across on the internet
Dynamic and static analysis with Real Time Malware/Executable Analysis Platform for Windows, including open-source XDR (2 EDR projects), ClamAV, YARA-X, machine learning AI, behavioral analysis, Un…
Get malware payload without dynamic analysis with this auto decompiler