Neo23x0 / yarAnalyzer
Yara Rule Analyzer and Statistics
☆366Updated 2 years ago
Alternatives and similar repositories for yarAnalyzer:
Users that are interested in yarAnalyzer are comparing it to the libraries listed below
- yarGen is a generator for YARA rules☆1,611Updated 9 months ago
- Simple Bash IOC Scanner☆722Updated 3 years ago
- A set of Zeek scripts to detect ATT&CK techniques.☆578Updated 8 months ago
- YARA Rules I come across on the internet☆335Updated 10 months ago
- ☆275Updated last year
- Automatic Yara Rule Generation☆332Updated 9 years ago
- User guide of MISP☆266Updated 2 months ago
- Online hash checker for Virustotal and other services☆822Updated 10 months ago
- DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted …☆309Updated last month
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆372Updated 2 years ago
- Repository of YARA rules made by Trellix ATR Team☆577Updated last year
- Clusters and elements to attach to MISP events or attributes (like threat actors)☆556Updated last week
- ☆1,066Updated 5 years ago
- CyLR - Live Response Collection Tool☆665Updated 2 years ago
- 16,432 Free Yara rules created by☆383Updated 5 years ago
- Malware Configuration And Payload Extraction☆752Updated 3 months ago
- Indicators from Unit 42 Public Reports☆708Updated this week
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆464Updated 6 years ago
- Web App for Volatility framework☆379Updated 3 months ago
- ReversingLabs YARA Rules☆796Updated 2 weeks ago
- Python library using the MISP Rest API☆453Updated 2 weeks ago
- Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries☆446Updated 3 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆433Updated 2 years ago
- FAME Automates Malware Evaluation☆881Updated 3 weeks ago
- ☆301Updated 4 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- MISP trainings, threat intel and information sharing training materials with source code☆401Updated last month
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆241Updated 3 years ago
- PCAP Samples for Different Post Exploitation Techniques☆354Updated 3 years ago
- Splunk Boss of the SOC version 2 dataset.☆372Updated 2 years ago