MalGamy / YARA_RulesLinks
☆67Updated 2 years ago
Alternatives and similar repositories for YARA_Rules
Users that are interested in YARA_Rules are comparing it to the libraries listed below
Sorting:
- Notes and IoCs of fresh malware☆59Updated last year
- Hive v5 file decryption algorithm☆34Updated 3 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- C2 Active Scanner☆60Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- Yara Rules for Modern Malware☆78Updated last year
- ☆31Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- Lazarus analysis tools and research report☆57Updated last year
- Detection rule validation☆40Updated 2 years ago
- information about ransomware groups (Ransomware Analysis Notes)☆40Updated last year
- A C# based tool for analysing malicious OneNote documents☆118Updated 2 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆119Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆116Updated 4 years ago
- ☆96Updated 7 months ago
- IOC Collection 2022☆57Updated 2 years ago
- Just my findings of malwares☆43Updated 3 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Updated 2 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- Reads and prints information from the website MalAPI.io☆19Updated 3 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Updated 2 years ago
- Configuration Extractors for Malware☆121Updated 7 months ago
- Configuration Extractor for BlackCat Ransomware☆31Updated 3 years ago
- Detection Engineering with YARA☆87Updated last year
- Collection of Malware Lures☆23Updated 4 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago
- Simple PowerShell script to enable process scanning with Yara.☆96Updated 3 years ago
- A small util to brute-force prefetch hashes☆77Updated 3 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Updated last year