Signature

Browse 0 cybersecurity solutions, with 0 security professionals searching monthly

PQC cryptographic library for quantum-secure key exchange & digital signatures.

A cryptographic framework that secures software update systems by enabling publishers to sign content offline and consumers to verify authenticity through trusted verification mechanisms.

A Windows context menu integration tool that scans files and folders for malware patterns, crypto signatures, and malicious documents using Yara rules and PEID signatures.

A signature-based, multi-threaded honeypot detection tool written in Golang that identifies honeypots through crafted requests and response analysis.

InvalidSign is a security research tool that bypasses endpoint solutions by obtaining valid signed files with different hashes to evade signature-based detection mechanisms.

SigThief extracts digital signatures from signed PE files and appends them to other files to create invalid signatures for testing Anti-Virus detection mechanisms.

A collection of public YARA signatures for various malware families.

Collection of YARA signatures from recent malware research.

A repository of Yara signatures under the GNU-GPLv2 license for the cybersecurity community.

A tool for signature analysis of RTF files to detect potentially unique parts and malicious documents.

A low interaction client honeypot that detects malicious websites using signature, anomaly and pattern matching techniques with automated URL collection and JavaScript analysis capabilities.