Automatic generation of YARA rules from sample files.
☆28Apr 10, 2025Updated 11 months ago
Alternatives and similar repositories for yarasilly2
Users that are interested in yarasilly2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Python wrapper library for libyara and a local server for fully utilizing the CPUs of the system to scan with yara...with additional ca…☆19Dec 8, 2022Updated 3 years ago
- An open source virus scan aggregation framework.☆25Apr 25, 2014Updated 11 years ago
- Fast ssdeep comparison library☆13Nov 3, 2014Updated 11 years ago
- A python3 GUI for famous antivirus clamav.☆19Jun 28, 2021Updated 4 years ago
- Toolkit collection developed to help malware analysts dissecting and detecting the packer used by GreyEnergy samples.☆16Jan 25, 2019Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Automated Yara Rule generation using Biclustering☆78Oct 8, 2025Updated 5 months ago
- ☆18Sep 13, 2021Updated 4 years ago
- IDARay is an IDA Pro plugin that matches the database against multiple YARA files which themselves may contain multiple rules.☆18Nov 16, 2018Updated 7 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆17Feb 6, 2025Updated last year
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- Tool for analysts to perform simultaneous lookups (IP, Domain, URL, MD5) against multiple data sources☆28Jan 27, 2017Updated 9 years ago
- Capa analysis importer for Ghidra.☆64Dec 2, 2020Updated 5 years ago
- Hunting cryptonote-related miners☆23Nov 3, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆16Jan 4, 2023Updated 3 years ago
- NEO Blockchain Quick Start Guide for .NET Developers☆13Jun 13, 2018Updated 7 years ago
- Utilities for working with vivisect☆26Oct 1, 2025Updated 5 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- Translates WinDbg "dt" structure dump to a C structure☆13Jul 20, 2020Updated 5 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14May 31, 2020Updated 5 years ago
- ☆64Apr 1, 2021Updated 4 years ago
- Oblivion-X is a high-risk script designed to modify system configurations on Samsung government-issued devices, disabling security featur…☆24Dec 16, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆55Sep 14, 2018Updated 7 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- Various Yara signatures (possibly to be included in a release later).☆87May 23, 2019Updated 6 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- ☆17Apr 25, 2018Updated 7 years ago
- Alternative YARA scanning engine☆73Aug 23, 2022Updated 3 years ago
- Utilities for the memory forensics framework☆22Jul 31, 2018Updated 7 years ago
- A Hobbyist Operating System based off the ReactOS/NT Kernel experimenting with OS Development.☆30Jul 29, 2012Updated 13 years ago
- Vovk is framework of tools that include a WinDbg extension that generates in-depth YARA rules for malware.☆24Aug 26, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆12Dec 8, 2020Updated 5 years ago
- Windows file system driver which allows to block access to files at run-time (C/C++, C#, WDK, SDK)☆13Jan 1, 2023Updated 3 years ago
- ☆60Mar 28, 2020Updated 6 years ago
- Tool for dropping malware from EK☆40Feb 9, 2018Updated 8 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆11Mar 12, 2026Updated 2 weeks ago
- Detect kerberos attacks in pcap files☆29Dec 13, 2015Updated 10 years ago
- Malware - Machine Learning☆11Mar 24, 2018Updated 8 years ago