YARA-Silly-Silly / yarasilly2View external linksLinks
Automatic generation of YARA rules from sample files.
☆28Apr 10, 2025Updated 10 months ago
Alternatives and similar repositories for yarasilly2
Users that are interested in yarasilly2 are comparing it to the libraries listed below
Sorting:
- Fast ssdeep comparison library☆13Nov 3, 2014Updated 11 years ago
- This is a repository for reporting any issues in any of my software☆13May 15, 2018Updated 7 years ago
- Toolkit collection developed to help malware analysts dissecting and detecting the packer used by GreyEnergy samples.☆16Jan 25, 2019Updated 7 years ago
- An example of COM hijacking using a proxy DLL.☆44Aug 17, 2021Updated 4 years ago
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆17Feb 6, 2025Updated last year
- Automated Yara Rule generation using Biclustering☆77Oct 8, 2025Updated 4 months ago
- IDARay is an IDA Pro plugin that matches the database against multiple YARA files which themselves may contain multiple rules.☆18Nov 16, 2018Updated 7 years ago
- Vovk is framework of tools that include a WinDbg extension that generates in-depth YARA rules for malware.☆24Aug 26, 2024Updated last year
- ☆18Sep 13, 2021Updated 4 years ago
- Utilities for working with vivisect☆26Oct 1, 2025Updated 4 months ago
- Fuzzy Hash calculated from import API of PE files☆91Aug 26, 2022Updated 3 years ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- Generate bulk YARA rules from YAML input☆22Feb 3, 2020Updated 6 years ago
- ☆53Sep 14, 2018Updated 7 years ago
- Various Yara signatures (possibly to be included in a release later).☆87May 23, 2019Updated 6 years ago
- Tool for analysts to perform simultaneous lookups (IP, Domain, URL, MD5) against multiple data sources☆28Jan 27, 2017Updated 9 years ago
- Capa analysis importer for Ghidra.☆64Dec 2, 2020Updated 5 years ago
- x64 PE-COFF virtualization driven obfuscation engine☆58Oct 14, 2022Updated 3 years ago
- ☆63Apr 1, 2021Updated 4 years ago
- ☆28Nov 25, 2025Updated 2 months ago
- 用于研究vs2008的crt源码,以编写windows下posix c 库☆29Mar 30, 2018Updated 7 years ago
- Alternative YARA scanning engine☆73Aug 23, 2022Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- Automatic Yara Rule Generation☆333Feb 2, 2016Updated 10 years ago
- ☆33Feb 26, 2022Updated 3 years ago
- A collection of free miscellaneous Windows tools☆142Jul 22, 2025Updated 6 months ago
- Dalamud Plugin that synchronizes your character data to one main character.☆15Jul 11, 2024Updated last year
- The Code implements the following: => Storing a file => Retrieving a file. Key Technologies used are PHP,HTML 5☆12Feb 5, 2023Updated 3 years ago
- An instrumentation script based on Frida which leverages Control Flow Guard to intercept indirect calls in CFG-enabled Windows binaries.☆30Jun 24, 2015Updated 10 years ago
- Yara station is a management portal for Neo23x0-Loki. The mission is to transform the standalone nature of the Loki scanner into a centra…☆36Feb 1, 2022Updated 4 years ago
- ☆34Nov 16, 2023Updated 2 years ago
- A Yara rule generator for finding related samples and hunting☆162Sep 11, 2022Updated 3 years ago
- This project tries to provide additional Ghidra Version Tracking Correlators suitable for patch diffing.☆93Oct 27, 2023Updated 2 years ago
- ☆12Jul 14, 2025Updated 7 months ago
- Ever wanted to compile/build a kernel ? But don't want to learn all the commands ? Then here comes a tool for you "Kernel Buildinator". N…☆10May 9, 2021Updated 4 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- Turns signals within a scope into c++ exceptions☆15Nov 8, 2022Updated 3 years ago
- The Sentinel.blog Repository provides automation tools for updating Analytics Rules, Content Hub Solutions, and Workbooks, eliminating re…☆17Updated this week
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Jan 7, 2022Updated 4 years ago