Signature
Browse 0 cybersecurity solutions, with 0 security professionals searching monthly
FEATURED
PQC cryptographic library for quantum-secure key exchange & digital signatures.
A cryptographic framework that secures software update systems by enabling publishers to sign content offline and consumers to verify authenticity through trusted verification mechanisms.
A Windows context menu integration tool that scans files and folders for malware patterns, crypto signatures, and malicious documents using Yara rules and PEID signatures.
A signature-based, multi-threaded honeypot detection tool written in Golang that identifies honeypots through crafted requests and response analysis.
InvalidSign is a security research tool that bypasses endpoint solutions by obtaining valid signed files with different hashes to evade signature-based detection mechanisms.
SigThief extracts digital signatures from signed PE files and appends them to other files to create invalid signatures for testing Anti-Virus detection mechanisms.
A collection of public YARA signatures for various malware families.
A repository of Yara signatures under the GNU-GPLv2 license for the cybersecurity community.
A tool for signature analysis of RTF files to detect potentially unique parts and malicious documents.
A low interaction client honeypot that detects malicious websites using signature, anomaly and pattern matching techniques with automated URL collection and JavaScript analysis capabilities.