Xen0ph0n / YaraGenerator
Automatic Yara Rule Generation
☆332Updated 9 years ago
Alternatives and similar repositories for YaraGenerator:
Users that are interested in YaraGenerator are comparing it to the libraries listed below
- 16,432 Free Yara rules created by☆383Updated 5 years ago
- YARA Rules I come across on the internet☆335Updated 10 months ago
- ☆202Updated last year
- A Yara rule generator for finding related samples and hunting☆158Updated 2 years ago
- ☆150Updated 6 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆433Updated 2 years ago
- Wraps around various tools and provides some additional checks/information to produce a centralized report of a PE file.☆205Updated 11 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆264Updated 3 years ago
- Django web interface for managing Yara rules☆190Updated 6 years ago
- Repository of modules and signatures contributed by the community☆326Updated 2 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆464Updated 6 years ago
- YARA malware query accelerator (web frontend)☆421Updated this week
- Malware Configuration And Payload Extraction☆753Updated 3 months ago
- Modified edition of cuckoo☆270Updated 5 years ago
- Cuckoo Sandbox Dockerfile☆325Updated 4 years ago
- Web interface for the Volatility Memory Forensics Framework☆259Updated 7 years ago
- snake - a malware storage zoo☆218Updated last year
- Modified edition of cuckoo☆396Updated 7 years ago
- IOC from articles, tweets for archives☆313Updated last year
- DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted …☆309Updated last month
- Malware static analysis framework☆176Updated 4 years ago
- Yara Rule Analyzer and Statistics☆368Updated 2 years ago
- Allows you to quickly query a Windows machine for RAM artifacts☆220Updated 4 years ago
- ☆275Updated last year
- Yara rules for malware families seen as part of targeted threats project☆135Updated 8 years ago
- Data from a BRAWL Automated Adversary Emulation Exercise☆204Updated 4 years ago
- Web App for Volatility framework☆378Updated 3 months ago
- Set of tools for interacting with Malshare☆152Updated 5 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆194Updated 7 years ago