dod-cyber-crime-center / kordesiiLinks
☆17Updated last year
Alternatives and similar repositories for kordesii
Users that are interested in kordesii are comparing it to the libraries listed below
Sorting:
- IDARay is an IDA Pro plugin that matches the database against multiple YARA files which themselves may contain multiple rules.☆18Updated 6 years ago
- Handy scripts to speed up malware analysis☆35Updated last year
- Various Yara signatures (possibly to be included in a release later).☆85Updated 6 years ago
- Modified edition of cuckoomon☆49Updated 6 years ago
- Ursnif beacon decryptor☆27Updated 2 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆38Updated 2 years ago
- ☆43Updated 6 years ago
- ☆23Updated 6 years ago
- BinSequencer is a script designed to find a common pattern of bytes within a set of samples and generate a YARA rule from the identified…☆76Updated 3 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆75Updated 10 years ago
- Yet another rule generator for Yara☆29Updated 4 years ago
- TA505 unpacker Python 2.7☆47Updated 4 years ago
- Steezy - Ghetto Yara Generation☆15Updated 2 years ago
- A python script that can be used to scan data within in an IDB using Yara.☆22Updated 6 years ago
- a modified version base on Tracecorn☆20Updated 5 years ago
- A tool to generate yara signatures from function blocks☆19Updated 10 years ago
- Hansel - a simple but flexible search for IDA☆25Updated 5 years ago
- A taxonomy and dictionary of malware behaviors.☆42Updated 5 years ago
- Use this library to automatically extract PE files compressed with aplib from a binary blob.☆34Updated 6 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 6 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆41Updated 5 years ago
- Go Lang Portable Executable Parser☆38Updated 4 years ago
- Yaras Random☆20Updated 6 years ago
- ☆71Updated last year
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- QEMU with rVMI extensions☆25Updated 7 years ago
- Cockroach is your primitive & immortal swiss army knife.☆49Updated 3 years ago
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Updated 8 years ago
- A collection of Volatility Framework plugins.☆26Updated 11 years ago
- This repository regroups the Yara Rules for the Unprotect Project☆25Updated 4 years ago