a collection of yara rules for binary analysis
☆24Aug 24, 2017Updated 8 years ago
Alternatives and similar repositories for YARA
Users that are interested in YARA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Multiple rules for yara-project for detect compiler/packer/protector☆33Dec 24, 2019Updated 6 years ago
- A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work.☆18Sep 10, 2023Updated 2 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆30Jun 27, 2018Updated 7 years ago
- Custom rules for yara-integrated scans☆16Jun 5, 2013Updated 12 years ago
- Yara rules for detecting malware☆23Sep 9, 2025Updated 6 months ago
- A domain name parser to parse and to validate a domain name.☆29Jun 19, 2016Updated 9 years ago
- Yaras Random☆24Feb 21, 2019Updated 7 years ago
- Yara rules for quick reverse engineering of malware.☆19Dec 9, 2015Updated 10 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Malice Yara Plugin☆29Sep 8, 2019Updated 6 years ago
- Metadefender Core (Metascan v.4 and v.3) analysis module for Viper malware analysis framework☆10Jan 6, 2021Updated 5 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆28Jan 5, 2026Updated 2 months ago
- YARA rules for use with ProcFilter☆90Jul 28, 2017Updated 8 years ago
- Generate YARA rules for OOXML documents.☆38Jun 1, 2023Updated 2 years ago
- IoC's, PCRE's, YARA's etc☆23Mar 25, 2025Updated last year
- interesting analysis☆16May 14, 2018Updated 7 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- 🌦️ Domain Ranker☆16Sep 7, 2019Updated 6 years ago
- X-Ways C# X-Tension API☆15May 28, 2013Updated 12 years ago
- Generate bulk YARA rules from YAML input☆22Feb 3, 2020Updated 6 years ago
- Various Modules & Scripts for use with Viper Framework☆27Aug 20, 2019Updated 6 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- LG On Screen Phone authentication bypass PoC (CVE-2014-8757)☆15Feb 6, 2015Updated 11 years ago
- Fuzzy Hash calculated from import API of PE files☆90Aug 26, 2022Updated 3 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Apr 13, 2015Updated 10 years ago
- Set of Yara rules for finding files using magics headers☆142Sep 8, 2020Updated 5 years ago
- Registry timestamp manipulation☆18Feb 26, 2014Updated 12 years ago
- Windows memory hacking library☆21Jul 14, 2016Updated 9 years ago
- VMware Snapshot Forensic Comparison Scripts☆25Mar 19, 2013Updated 13 years ago
- ☆11Jan 6, 2020Updated 6 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆18Oct 7, 2016Updated 9 years ago
- Evidence Fetcher (efetch) is a web-based file explorer, viewer, and analyzer.☆39Apr 11, 2020Updated 5 years ago
- Openssh backdoor found with a ssh honeypot☆27Jul 22, 2016Updated 9 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- Python script to batch query the Tor Relays and Bridges☆38Mar 8, 2019Updated 7 years ago
- VM setup for Malware RE labs☆28Apr 26, 2019Updated 6 years ago
- SWF Vulnerability & Information Scanner☆18Nov 24, 2018Updated 7 years ago
- ☆26Jun 4, 2018Updated 7 years ago
- Tools to work on Android Full Disk Encryption (FDE).☆61Feb 3, 2015Updated 11 years ago