codewatchorg / Burp-Yara-RulesLinks
Yara rules to be used with the Burp Yara-Scanner extension
☆49Updated 3 years ago
Alternatives and similar repositories for Burp-Yara-Rules
Users that are interested in Burp-Yara-Rules are comparing it to the libraries listed below
Sorting:
- Repository of yara rules☆60Updated 2 years ago
- Yara rules for detecting malware☆24Updated 11 months ago
- Process HTTP Pcaps With YARA☆105Updated 12 years ago
- Mass static malware analysis tool☆95Updated 3 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 7 years ago
- Validates yara rules and tries to repair the broken ones.☆39Updated 4 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- ☆54Updated 4 years ago
- ☆52Updated 6 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Updated last month
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABS☆82Updated 4 years ago
- mindmap created for tools can be used during analysis/investigation☆27Updated 8 years ago
- Yara intergrated into BurpSuite☆48Updated 9 years ago
- Collection of YARA signatures from individual research☆44Updated last year
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- Web based Manager for Yara Rules☆58Updated 5 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆60Updated 7 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- A collection of infosec related scripts and information.☆53Updated 10 months ago
- Credential Phish Analysis and Automation☆97Updated 7 years ago
- ☆37Updated 8 years ago
- Malware/IOC ingestion and processing engine☆106Updated 6 years ago
- evtx2json extracts events of interest from event logs, dedups them, and exports them to json.☆42Updated 4 years ago
- Modular command-line threat hunting tool & framework.☆17Updated 5 years ago
- Deploy MISP Project software with Vagrant.☆43Updated 5 years ago