How to use:
./wordle.sh
Or try the unlimit mode:
| # Simple script to demo use of yara-python + externals | |
| # think of all the externals you could define! | |
| import os | |
| import sys | |
| import yara | |
| example_rule = ''' | |
| rule demo_externals | |
| { |
| //Locate RPC procecures inside of server code | |
| //@author Matt Hand (@matterpreter) based on original work by Sektor7 Labs (@reenz0h) | |
| //@category Functions | |
| //@keybinding | |
| //@menupath | |
| //@toolbar | |
| import ghidra.app.script.GhidraScript; | |
| import ghidra.program.model.block.*; | |
| import ghidra.program.model.symbol.*; |
| /* | |
| This was the first version - the newer version also includes *When* it was loaded also. | |
| https://gist.github.com/olliencc/e166a64ca211c51eb69111f26ce57bc1 | |
| */ |
| # Attempts to demangle all mangled symbols in the current program using the Rust | |
| # mangling schemes, and replace the default symbol and function signature | |
| # (if applicable) with the demangled symbol. | |
| # | |
| # License: MIT OR Apache-2.0 | |
| #@author Jack Grigg <[email protected]> | |
| #@category Symbol | |
| import string |
| from os import urandom | |
| from socket import create_connection | |
| from cryptography.hazmat.primitives.asymmetric import padding | |
| from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes | |
| from cryptography.hazmat.primitives.serialization import load_der_public_key | |
| def read(sock, length): | |
| result = b'' |
Scalable Vector Extensions (SVE) is ARM’s latest SIMD extension to their instruction set, which was announced back in 2016. A follow-up SVE2 extension was announced in 2019, designed to incorporate all functionality from ARM’s current primary SIMD extension, NEON (aka ASIMD).
Despite being announced 5 years ago, there is currently no generally available CPU which supports any form of SVE (which excludes the [Fugaku supercomputer](https://www.fujitsu.com/global/about/innovation/
| # log4j jndi exploit CVE-2021-44228 filter | |
| # Save this file as /etc/fail2ban/filter.d/log4j-jndi.conf | |
| # then copy and uncomment the [log4j-jndi] section | |
| # to /etc/fail2ban/jail.local | |
| # | |
| # [email protected] | |
| # https://jay.gooby.org/2021/12/13/a-fail2ban-filter-for-the-log4j-cve-2021-44228 | |
| # https://gist.github.com/jaygooby/3502143639e09bb694e9c0f3c6203949 | |
| # Thanks to https://gist.github.com/kocour for a better regex | |
| # |
This list is no longer updated, thus the information is no longer reliable.
You can see the latest version (from october 2022) here
| rule malware_karama_0 { | |
| meta: | |
| descrption = "Karma Ransomware" | |
| strings: | |
| $name = "KARMA" ascii wide nocase | |
| $trait_0 = {33 f6 0f b7 41 ?? 83 c1 02 8b d0 66 85 c0 75 da} | |
| $trait_1 = {0f b7 d0 66 83 fa 5c 74 10} | |
| condition: | |
| uint16(0) == 0x5a4d and | |
| uint32(uint32(0x3c)) == 0x00004550 and |