Pattern Extractor for Obfuscated Code
☆302Feb 12, 2022Updated 4 years ago
Alternatives and similar repositories for Fnord
Users that are interested in Fnord are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Online hash checker for Virustotal and other services☆849Mar 21, 2025Updated last year
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 3 years ago
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and man…☆302Apr 24, 2020Updated 6 years ago
- yarGen is a generator for YARA rules☆1,786Jan 10, 2026Updated 3 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆50Jan 13, 2020Updated 6 years ago
- A collection of typical false positive indicators☆56Dec 5, 2020Updated 5 years ago
- Generating YARA rules based on binary code☆221Oct 7, 2021Updated 4 years ago
- Awesome VirusTotal Intelligence Search Queries☆333May 16, 2023Updated 2 years ago
- A YARA Rule Performance Measurement Tool☆63Feb 26, 2024Updated 2 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆28Jan 5, 2026Updated 4 months ago
- BinSequencer is a script designed to find a common pattern of bytes within a set of samples and generate a YARA rule from the identified…☆80Jan 2, 2022Updated 4 years ago
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆280Dec 13, 2021Updated 4 years ago
- YARA signature and IOC database for my scanners and tools☆2,949Updated this week
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A machine learning tool that ranks strings based on their relevance for malware analysis.☆756Mar 11, 2026Updated last month
- Toolset for research malware and Cobalt Strike beacons☆211Mar 11, 2025Updated last year
- Automatically generate AV byte signatures from sets of similar binaries.☆287Updated this week
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Jul 13, 2018Updated 7 years ago
- Generate bulk YARA rules from YAML input☆22Feb 3, 2020Updated 6 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆478Apr 8, 2021Updated 5 years ago
- Yara rules☆21Mar 27, 2023Updated 3 years ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆23Dec 13, 2018Updated 7 years ago
- Loki - Simple IOC and YARA Scanner☆3,753Jan 12, 2026Updated 3 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- DFIRTrack - The Incident Response Tracking Application☆534Jan 13, 2026Updated 3 months ago
- API functions for Malware Research☆35Jul 9, 2019Updated 6 years ago
- Malware Configuration And Payload Extraction☆760Nov 22, 2024Updated last year
- A toolset to make a system look as if it was the victim of an APT attack☆2,739Sep 23, 2025Updated 7 months ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆587May 5, 2024Updated 2 years ago
- BASS - BASS Automated Signature Synthesizer☆179Sep 19, 2018Updated 7 years ago
- Volatility plugin for extracts configuration data of known malware☆496Dec 22, 2023Updated 2 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆507Oct 21, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Invisible Watermarks with Space Characters in ASCII Files☆21Jun 14, 2018Updated 7 years ago
- YARA malware query accelerator (web frontend)☆437Feb 3, 2026Updated 3 months ago
- ☆350Mar 19, 2021Updated 5 years ago
- Vthunting is a tiny script used to generate report about Virus Total hunting and send it by email, slack or telegram.☆169Feb 8, 2023Updated 3 years ago
- Random hunting ordiented yara rules☆96Mar 27, 2023Updated 3 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Jan 31, 2022Updated 4 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago