VirusTotal / yara-xLinks
A rewrite of YARA in Rust.
☆978Updated last week
Alternatives and similar repositories for yara-x
Users that are interested in yara-x are comparing it to the libraries listed below
Sorting:
- AVML - Acquire Volatile Memory for Linux☆1,037Updated 3 weeks ago
- A Fast (and safe) parser for the Windows XML Event Log (EVTX) format☆865Updated this week
- Threat-hunting tool for Linux☆1,030Updated last month
- High Octane Triage Analysis☆807Updated this week
- AssemblyLine 4: File triage and malware analysis☆405Updated 2 weeks ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆663Updated last week
- Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts…☆1,054Updated last month
- ReversingLabs YARA Rules☆887Updated 2 months ago
- Cuckoo3 is a Python 3 open source automated malware analysis system.☆788Updated 3 weeks ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,253Updated 3 weeks ago
- Living Off The Land Drivers☆1,355Updated 3 weeks ago
- Rust Library Recognition Project for Rust Malware by the MSTIC-MIRAGE Team☆336Updated 3 weeks ago
- Distributed malware processing framework based on Python, Redis and S3.☆457Updated last month
- The multi-platform memory acquisition tool.☆920Updated 2 months ago
- A GUI and CLI tool for removing bloat from executables☆437Updated 6 months ago
- Elastic Security detection content for Endpoint☆1,358Updated 3 weeks ago
- Collection of private Yara rules.☆375Updated 3 weeks ago
- A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale.☆972Updated last month
- MBC content in markdown☆513Updated 6 months ago
- Automated YARA Rule Standardization and Quality Assurance Tool☆265Updated last week
- Memory acquisition for Linux that makes sense.☆216Updated 2 years ago
- Indicators of Compromises (IOC) of our various investigations☆1,905Updated 2 weeks ago
- Go symbol recovery tool☆879Updated last month
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆2,971Updated 3 weeks ago
- Malware repository component for samples & static configuration with REST API interface.☆374Updated 2 weeks ago
- A Binary Genetic Traits Lexer Framework☆518Updated 4 months ago
- Collection of Linux and macOS Volatility3 Intermediate Symbol Files (ISF), suitable for memory analysis 🔍☆246Updated last month
- Malduck is your ducky companion in malware analysis journeys☆348Updated 6 months ago
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆692Updated 2 months ago
- Malware Configuration And Payload Extraction☆2,884Updated this week