codeyourweb / irmaLinks
enpoint detection / live analysis & sandbox host / signatures quality test
☆44Updated 4 years ago
Alternatives and similar repositories for irma
Users that are interested in irma are comparing it to the libraries listed below
Sorting:
- Golang Parser for Microsoft Event Logs☆105Updated 2 months ago
- A Go implementation and parser for Sigma rules.☆93Updated 7 months ago
- A Go implementation of JARM☆120Updated 3 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆37Updated last month
- gyp: A pure Go YARA parser☆106Updated last year
- simple YARA-based IOC scanner☆173Updated last month
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated 2 years ago
- YaraScanner is a file pattern-matching tool based on YARA rules.☆60Updated 2 years ago
- Collect autorun records from running system☆59Updated 3 years ago
- Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives …☆167Updated last year
- Python based CLI for MalwareBazaar☆39Updated 5 months ago
- THOR Thunderstorm Collectors☆25Updated this week
- Golang library that implements a sigma log rule parser and match engine.☆103Updated last year
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 10 months ago
- Malware similarity platform with modularity in mind.☆80Updated 4 years ago
- Go library for ETW (Event Tracing for Windows) events processing☆69Updated 3 years ago
- YARA rule analyzer to improve rule quality and performance☆108Updated 9 months ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 3 years ago
- JPCERT/CC public YARA rules repository☆110Updated last month
- A home for detection content developed by the delivr.to team☆73Updated 5 months ago
- Imphash-like calculation on Golang binaries☆49Updated 3 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Updated 3 months ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆114Updated this week
- Standardized Malware Analysis Tool☆56Updated 4 years ago
- ☆46Updated 2 years ago
- ☆14Updated 2 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Updated 4 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago