fox-it / mkYARALinks
Generating YARA rules based on binary code
☆218Updated 4 years ago
Alternatives and similar repositories for mkYARA
Users that are interested in mkYARA are comparing it to the libraries listed below
Sorting:
- This project aims at simplifying Windows API import recovery on arbitrary memory dumps☆262Updated 2 years ago
- ☆97Updated 5 years ago
- Automatic YARA rule generation for Malpedia☆165Updated 3 years ago
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆142Updated 3 years ago
- IDA python plugin to scan binary with Yara rules☆180Updated 2 years ago
- A tool for de-obfuscating PowerShell scripts☆71Updated 6 years ago
- Various Yara signatures (possibly to be included in a release later).☆87Updated 6 years ago
- Official VirusTotal plugin for IDA Pro☆177Updated last week
- BinSequencer is a script designed to find a common pattern of bytes within a set of samples and generate a YARA rule from the identified…☆80Updated 4 years ago
- Script analysis tool based on Frida.re☆130Updated 8 years ago
- Automatically generate AV byte signatures from sets of similar binaries.☆285Updated last year
- Automatically rebuild Import Address Table for dumped PE file. With python bindings!☆121Updated 7 years ago
- Automated malware unpacker☆120Updated 9 years ago
- c2 traffic☆193Updated 2 years ago
- FileInsight-plugins: decoding toolbox of McAfee FileInsight hex editor for malware analysis☆163Updated last year
- A tool to detect and crash Cuckoo Sandbox☆296Updated last year
- Yara rule making tool (IDA Pro & Binary Ninja & Cutter & Ghidra Plugin)☆242Updated last year
- Robust Automated Malware Unpacker☆87Updated 2 years ago
- Smart DLL execution for malware analysis in sandbox systems☆143Updated 10 years ago
- DrSemu - Sandboxed Malware Detection and Classification Tool Based on Dynamic Behavior☆278Updated 6 years ago
- Symbol hash for ELF files☆113Updated 3 years ago
- Wraps around various tools and provides some additional checks/information to produce a centralized report of a PE file.☆208Updated 12 years ago
- ☆136Updated 7 years ago
- Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code☆184Updated 5 years ago
- ☆85Updated 6 years ago
- Parsers for custom malware formats ("Funky malware formats")☆98Updated 4 years ago
- Parse YARA rules and operate over them more easily.☆195Updated 11 months ago
- Command-line and Python debugger for instrumenting and modifying native software behavior on Windows and Linux.☆164Updated 2 years ago
- snake - a malware storage zoo☆217Updated 2 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆77Updated 11 years ago