YARA duplicate rule detection and removal. YARA rule index creation. YARA rule file merger.
☆10Jan 19, 2026Updated 2 months ago
Alternatives and similar repositories for YARA_Rules_Util
Users that are interested in YARA_Rules_Util are comparing it to the libraries listed below
Sorting:
- ASN.1 parser used by PeNet do parse Authenticode signatures☆14Apr 11, 2025Updated 11 months ago
- Lookup file hashes, domain names and IP addresses using various vendors to assist with triaging potential threats.☆29Feb 15, 2026Updated last month
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆18Sep 3, 2024Updated last year
- Deduplication of yara rules☆10Sep 18, 2017Updated 8 years ago
- Collection of scripts for use with Carbon Black Cb Response API☆14May 7, 2022Updated 3 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆82Mar 25, 2024Updated last year
- generate yara-androguard report on your local and scan☆12Oct 3, 2019Updated 6 years ago
- World's First Haiku Ransomware/Malware☆16Dec 22, 2024Updated last year
- A database-based strong Windows Disk Cleaner With Utilities☆19Nov 25, 2025Updated 3 months ago
- A fast, possibly the fastest, square root function for large integers and floats in C# and Java. The algorithm uses a variety of new and …☆16Mar 27, 2025Updated 11 months ago
- Buchbergers algorithm for computing Groebner basis of polynonmial ideals☆13Dec 2, 2023Updated 2 years ago
- GDI malware made by Itzsten, for educational purposes only☆13Jul 20, 2025Updated 8 months ago
- LINQ to Z3 - an esoteric LINQ binding based on Bart De Smet's idea☆14Nov 23, 2021Updated 4 years ago
- Creates a counting system of radixes such as base 12 or mixed radixes such as Minutes/Hours/Days/Years (60/60/24/365)☆13May 8, 2019Updated 6 years ago
- Scripts for OWASP-ZAP☆13Oct 7, 2025Updated 5 months ago
- A structured, continuously updated threat-intelligence repository focused on ransomware families and threat actors.☆37Updated this week
- Typer text editor featured in "Millennium Computing" Win32/C video tutorials☆31Sep 1, 2019Updated 6 years ago
- Work In Progress☆10Jul 10, 2024Updated last year
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- Public datasets of malware and benign executable files (Windows EXE files). The dataset can be used by cybersecurity researchers focusing…☆24Jul 25, 2023Updated 2 years ago
- A complete, proof-of-concept, C# implementation of the General Number Field Sieve algorithm for factoring very large semi-prime numbers. …☆62May 24, 2025Updated 9 months ago
- Windows 10/11 unsigned kernel driver load/debugging☆19Feb 17, 2023Updated 3 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- ☆13Sep 22, 2022Updated 3 years ago
- ☆10Dec 28, 2015Updated 10 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Universal keyboard navigation for GUI-based systems & software☆20May 13, 2020Updated 5 years ago
- ☆14Dec 24, 2023Updated 2 years ago
- Go bindings for YARA☆18Mar 10, 2022Updated 4 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- The first 100% open-source Firewall for Windows 8/10/11 based on domain names !☆11Jul 6, 2022Updated 3 years ago
- Antivirus engine that allows you to create your own anti-virus☆11Nov 2, 2012Updated 13 years ago
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- A fully original Windows anti-virus client from HonestRepair using the same custom antivirus engine as our Cloud.☆16Dec 19, 2019Updated 6 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- ☆14Oct 5, 2013Updated 12 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- AYY LMAO☆12Aug 27, 2015Updated 10 years ago