a collection of yara rules for binary analysis
☆24Aug 24, 2017Updated 8 years ago
Alternatives and similar repositories for YARA
Users that are interested in YARA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Multiple rules for yara-project for detect compiler/packer/protector☆33Dec 24, 2019Updated 6 years ago
- A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work.☆18Sep 10, 2023Updated 2 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆30Jun 27, 2018Updated 7 years ago
- Yaras Random☆24Feb 21, 2019Updated 7 years ago
- Yara rules for quick reverse engineering of malware.☆19Dec 9, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Repository of yara rules☆60Nov 29, 2022Updated 3 years ago
- Malice Yara Plugin☆29Sep 8, 2019Updated 6 years ago
- Metadefender Core (Metascan v.4 and v.3) analysis module for Viper malware analysis framework☆10Jan 6, 2021Updated 5 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆28Jan 5, 2026Updated 3 months ago
- YARA rules for use with ProcFilter☆89Jul 28, 2017Updated 8 years ago
- Generate YARA rules for OOXML documents.☆38Jun 1, 2023Updated 2 years ago
- Yara rules to be used with the Burp Yara-Scanner extension☆49Jan 26, 2022Updated 4 years ago
- IoC's, PCRE's, YARA's etc☆23Mar 25, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- interesting analysis☆16May 14, 2018Updated 7 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- X-Ways C# X-Tension API☆17May 28, 2013Updated 12 years ago
- slide☆13Oct 26, 2017Updated 8 years ago
- Generate bulk YARA rules from YAML input☆22Feb 3, 2020Updated 6 years ago
- Various Modules & Scripts for use with Viper Framework☆27Aug 20, 2019Updated 6 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- Fuzzy Hash calculated from import API of PE files☆90Aug 26, 2022Updated 3 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Apr 13, 2015Updated 11 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Set of Yara rules for finding files using magics headers☆142Sep 8, 2020Updated 5 years ago
- Registry timestamp manipulation☆18Feb 26, 2014Updated 12 years ago
- Windows memory hacking library☆21Jul 14, 2016Updated 9 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆18Oct 7, 2016Updated 9 years ago
- The development place of AFFT, a toolkit to automatically acquire and extract data from Android image dumps☆49Jun 10, 2016Updated 9 years ago
- Evidence Fetcher (efetch) is a web-based file explorer, viewer, and analyzer.☆39Apr 11, 2020Updated 6 years ago
- Openssh backdoor found with a ssh honeypot☆27Jul 22, 2016Updated 9 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- Python script to batch query the Tor Relays and Bridges☆38Mar 8, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- VM setup for Malware RE labs☆28Apr 26, 2019Updated 6 years ago
- SWF Vulnerability & Information Scanner☆18Nov 24, 2018Updated 7 years ago
- 收集的各大公司发布的物联网安全年度报告☆13Jul 31, 2017Updated 8 years ago
- ☆26Jun 4, 2018Updated 7 years ago
- Tools to work on Android Full Disk Encryption (FDE).☆61Feb 3, 2015Updated 11 years ago
- ☆11Mar 26, 2018Updated 8 years ago
- ☆18Jun 8, 2018Updated 7 years ago