Yaralyze is an malware detection tool for Android that relies on two types of static analysis, Yara rule analysis and hashes analysis.
☆21Nov 13, 2022Updated 3 years ago
Alternatives and similar repositories for Yaralyze
Users that are interested in Yaralyze are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dynamic Malware Analsysis Sandbox☆17Nov 5, 2025Updated 4 months ago
- Download browser extension's source code as zip☆21Nov 23, 2025Updated 4 months ago
- ☆14Oct 25, 2022Updated 3 years ago
- ☆18Jan 22, 2026Updated 2 months ago
- Voice Activity Detection (VAD) AudioWorklet☆18Jun 10, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Work In Progress☆10Jul 10, 2024Updated last year
- Windows 10/11 unsigned kernel driver load/debugging☆19Feb 17, 2023Updated 3 years ago
- ☆13Sep 22, 2022Updated 3 years ago
- ☆14Dec 24, 2023Updated 2 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆78Jan 26, 2026Updated 2 months ago
- The first 100% open-source Firewall for Windows 8/10/11 based on domain names !☆11Jul 6, 2022Updated 3 years ago
- YARA duplicate rule detection and removal. YARA rule index creation. YARA rule file merger.☆10Jan 19, 2026Updated 2 months ago
- A fully original Windows anti-virus client from HonestRepair using the same custom antivirus engine as our Cloud.☆16Dec 19, 2019Updated 6 years ago
- ☆12Feb 25, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Yara rules for malicious javascript files from public repositories or written by me.☆13Nov 12, 2021Updated 4 years ago
- Given a string determine the possible hashing algorithms used to produce that string.☆17Nov 23, 2020Updated 5 years ago
- Unauthenticated RCE in ZoneMinder Snapshots - Poc Exploit☆23May 7, 2024Updated last year
- Kill malawarebytes process. Can be ported to any programming language.☆12Apr 21, 2025Updated 11 months ago
- generate yara-androguard report on your local and scan☆12Oct 3, 2019Updated 6 years ago
- Malware Analysis and Storage System - Server repository☆12Jul 15, 2022Updated 3 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- A tool to extract the DEX file from ODEX compiled ahead of time version.☆11Sep 28, 2021Updated 4 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆56Dec 13, 2025Updated 3 months ago
- ☆12Feb 24, 2023Updated 3 years ago
- ☆11Oct 30, 2024Updated last year
- Extensible MacOS system telemetry generator.☆55Mar 1, 2026Updated 3 weeks ago
- Exploit for CVE-2024-4883☆11Jul 8, 2024Updated last year
- ☆10Aug 11, 2025Updated 7 months ago
- ☆15Sep 24, 2024Updated last year
- 22-23-24 Temmuz 2022 Tarihinde yapılan Siber Güvenlik Eğitimlerine Ait Dökümanlar☆31Jan 19, 2026Updated 2 months ago
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github …☆21Aug 11, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆12Mar 10, 2023Updated 3 years ago
- This project shows how the W3C EME API can be used to perform fingerprinting of devices using the Widevine DRM system.☆38Jun 11, 2024Updated last year
- Collection of my own detection rules☆20Jan 6, 2026Updated 2 months ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 3 months ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- List of groups that are carrying out cyber actions in the conflict between Israel and Iran.☆31Feb 12, 2026Updated last month
- Google App Engine Sharded Counters Sample Application in Python☆29Aug 10, 2015Updated 10 years ago