YARA Rule Strings Statistics Calculator and Malware Research Helper
☆14Jul 24, 2021Updated 4 years ago
Alternatives and similar repositories for statiStrings
Users that are interested in statiStrings are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- A Yara Lua output script for Suricata☆20Apr 7, 2019Updated 6 years ago
- ☆15Nov 25, 2021Updated 4 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- Repository of Yara rules created by the Stratosphere team☆29Jul 8, 2021Updated 4 years ago
- A yara based MCP Server☆23Mar 16, 2026Updated last week
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Feb 15, 2022Updated 4 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 3 years ago
- Vuls Beater for Elasticsearch - connecting vuls☆17Dec 15, 2020Updated 5 years ago
- A collection of my reverse engineering and malware analysis write-ups☆21Dec 11, 2020Updated 5 years ago
- ☆27Mar 2, 2022Updated 4 years ago
- XOR Key Extractor☆51Aug 10, 2024Updated last year
- open source malware analysis and research notes dump☆26Aug 30, 2023Updated 2 years ago
- Random hunting ordiented yara rules☆96Mar 27, 2023Updated 2 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- Reviews and tests of security products☆17Dec 28, 2024Updated last year
- A collection of ready-to-use library code and symbols for the MinHash-based Code Relationship & Investigation Toolkit (MCRIT)☆12Dec 10, 2025Updated 3 months ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- List with File Extensions used by Ransomware☆37Updated this week
- Yet Another Fake Honeypot written in Go☆10Dec 8, 2017Updated 8 years ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 8 years ago
- ☆53Nov 11, 2021Updated 4 years ago
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated 2 months ago
- ☆23Aug 1, 2020Updated 5 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Aug 18, 2020Updated 5 years ago
- ☆24Jul 6, 2018Updated 7 years ago
- A Powershell script for signing or adding signatures to tap-windows6 drivers☆10Apr 18, 2019Updated 6 years ago
- mod to myaut2exe decompiler☆19Jul 28, 2017Updated 8 years ago
- ☆13Sep 21, 2021Updated 4 years ago
- `busybox` Docker image for multiple architectures☆12Jun 8, 2019Updated 6 years ago
- Lazarus analysis tools and research report☆57Dec 22, 2023Updated 2 years ago
- IronWASP module to test security of SSL services. Ported from http://www.bolet.org/TestSSLServer/☆12Sep 2, 2013Updated 12 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Feb 24, 2023Updated 3 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆12Apr 30, 2014Updated 11 years ago
- Run pkgcheck for ebuild repos via GitHub action.☆14Feb 3, 2024Updated 2 years ago
- Collection of generic YARA rules☆16Updated this week
- enpoint detection / live analysis & sandbox host / signatures quality test☆44Apr 22, 2021Updated 4 years ago
- ☆17Nov 12, 2017Updated 8 years ago