AlienVault-OTX / yabin
A Yara rule generator for finding related samples and hunting
☆157Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for yabin
- BinSequencer is a script designed to find a common pattern of bytes within a set of samples and generate a YARA rule from the identified…☆74Updated 2 years ago
- Tools for parsing rulesets using the exact grammar as YARA. Written in Go.☆82Updated last year
- Repository containing IOCs, CSV and MISP JSON from our blogs☆79Updated 3 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆154Updated 4 years ago
- Automated malware unpacker☆118Updated 8 years ago
- A mapping of used malware names to commonly known family names☆61Updated last year
- A warehouse for your malware☆133Updated 11 years ago
- ☆82Updated 8 years ago
- Various Yara signatures (possibly to be included in a release later).☆85Updated 5 years ago
- ☆134Updated 5 years ago
- Web based Manager for Yara Rules☆57Updated 4 years ago
- Malware Repository Framework☆100Updated 6 years ago
- My Yara Rules Collection☆52Updated 8 years ago
- Process HTTP Pcaps With YARA☆101Updated 11 years ago
- Sample staging & detonation utility to be used in combination with Cuckoo Sandbox.☆82Updated 11 months ago
- Parse YARA rules and operate over them more easily.☆174Updated 4 months ago
- Django web interface for managing Yara rules☆190Updated 6 years ago
- A dumb set of scripts for building a cuckoo rig☆61Updated 7 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆193Updated 7 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated last year
- Lazy Office Analyzer☆119Updated 7 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆255Updated 5 years ago
- Modified edition of cuckoo community modules☆50Updated 7 years ago
- Yara rules for malware families seen as part of targeted threats project☆134Updated 8 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆80Updated 7 years ago
- ☆96Updated 4 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆77Updated 4 years ago
- Various config files obtained during malware analysis☆67Updated 6 years ago
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABS☆81Updated 3 years ago
- Smart DLL execution for malware analysis in sandbox systems☆141Updated 9 years ago