JPCERTCC / YAMA
Yet Another Memory Analyzer for malware detection
☆179Updated 9 months ago
Alternatives and similar repositories for YAMA:
Users that are interested in YAMA are comparing it to the libraries listed below
- JPCERT/CC public YARA rules repository☆106Updated 3 months ago
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.☆165Updated last week
- Takajō (鷹匠) is a Hayabusa results analyzer.☆110Updated last month
- A ProcessMonitor visualization application written in rust.☆177Updated last year
- Sample evtx files to use for testing hayabusa detection rules☆51Updated 4 months ago
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (EXT4, XFS) journals (not systemd-journald), generates…☆58Updated 2 weeks ago
- Harness the power of Splunk for your investigations☆94Updated last week
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆119Updated 11 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆146Updated 6 months ago
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 2 months ago
- Elastic Security Labs releases☆61Updated last week
- Lazarus analysis tools and research report☆55Updated last year
- Active C&C Detector☆152Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023☆76Updated last year
- ☆124Updated last month
- PowerShell Script Analyzer☆68Updated last year
- ☆60Updated 10 months ago
- Repository of Yara Rules☆103Updated last month
- Welcome to the SEKOIA.IO Community repository!☆143Updated last week
- YARA rule analyzer to improve rule quality and performance☆97Updated 3 months ago
- yara detection rules for hunting with the threathunting-keywords project☆113Updated 3 weeks ago
- A C# based tool for analysing malicious OneNote documents☆111Updated last year
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- ☆66Updated 2 years ago
- RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.☆72Updated 2 years ago
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆206Updated last year
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆121Updated 2 months ago
- Automated YARA Rule Standardization and Quality Assurance Tool☆200Updated this week
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆139Updated last year
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆141Updated 8 months ago