capa-rules
Capabilities detector
A standard collection of rules for identifying capabilities in programs
Standard collection of rules for capa: the tool for enumerating the capabilities of programs
541 stars
23 watching
163 forks
last commit: 6 days ago Related projects:
Repository | Description | Stars |
---|---|---|
mandiant/capa | An executable file analysis tool that identifies capabilities and potential malicious behaviors. | 4,873 |
mandiant/mandiant-azure-ad-investigator | A PowerShell module designed to detect potential security threats in Azure AD environments | 615 |
trancee/capacitor-google-mlkit-vision | An app for on-device face detection using machine learning | 12 |
tdahlmann/canpp | A comprehensive tool for receiving, transmitting and analyzing CAN bus messages. | 43 |
zjlywjh001/can_omega | A tool for hacking and analyzing car CAN bus systems | 44 |
neo23x0/rules | A centralized repository of Yara rules for detecting malware and other malicious activities. | 10 |
gaul/modernizer-maven-plugin | Detects uses of legacy Java APIs in source code to recommend modern alternatives. | 371 |
cap-go/capacitor-mute | A plugin to detect if a device's mute switch is enabled or disabled | 5 |
aleksibovellan/opnsense-suricata-nmaps | Customized Suricata detection rules to identify NMAP scan types | 52 |
junker/mobiledetect | A system for detecting mobile devices in user agent strings using patterns and regular expressions. | 4 |
zhangludl/code-and-dataset-for-capsal | Provides code and datasets for a saliency object detection method that leverages captioning to improve accuracy | 50 |
travisbgreen/hunting-rules | Provides Suricata IDS alert rules for detecting network anomalies | 153 |
chronicle/detection-rules | A collection of YARA-L 2.0 sample rules and dashboards for threat detection in Google Security Operations | 316 |
seeeddocument/usb-can-analyzer | An adapter that enables communication between a CAN bus device and a computer via USB. | 101 |
mostaphabahadou/postenum | Automates system information gathering after gaining access to a Linux system. | 279 |