fox-it / mkYARALinks
Generating YARA rules based on binary code
☆213Updated 3 years ago
Alternatives and similar repositories for mkYARA
Users that are interested in mkYARA are comparing it to the libraries listed below
Sorting:
- ☆98Updated 4 years ago
- This project aims at simplifying Windows API import recovery on arbitrary memory dumps☆253Updated 2 years ago
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆139Updated 2 years ago
- IDA python plugin to scan binary with Yara rules☆177Updated last year
- A tool for de-obfuscating PowerShell scripts☆69Updated 6 years ago
- Automatic YARA rule generation for Malpedia☆161Updated 2 years ago
- Various Yara signatures (possibly to be included in a release later).☆86Updated 6 years ago
- Official VirusTotal plugin for IDA Pro☆158Updated last week
- Script analysis tool based on Frida.re☆129Updated 8 years ago
- c2 traffic☆189Updated 2 years ago
- Automatically rebuild Import Address Table for dumped PE file. With python bindings!☆120Updated 6 years ago
- Automatically generate AV byte signatures from sets of similar binaries.☆278Updated 8 months ago
- FileInsight-plugins: decoding toolbox of McAfee FileInsight hex editor for malware analysis☆162Updated 8 months ago
- BinSequencer is a script designed to find a common pattern of bytes within a set of samples and generate a YARA rule from the identified…☆77Updated 3 years ago
- DrSemu - Sandboxed Malware Detection and Classification Tool Based on Dynamic Behavior☆275Updated 5 years ago
- Yara rule making tool (IDA Pro & Binary Ninja & Cutter & Ghidra Plugin)☆238Updated 10 months ago
- Robust Automated Malware Unpacker☆85Updated 2 years ago
- Parsers for custom malware formats ("Funky malware formats")☆96Updated 3 years ago
- Symbol hash for ELF files☆112Updated 3 years ago
- Smart DLL execution for malware analysis in sandbox systems☆144Updated 10 years ago
- Automated malware unpacker☆120Updated 9 years ago
- Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code☆184Updated 4 years ago
- snake - a malware storage zoo☆216Updated 2 years ago
- ☆84Updated 5 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆76Updated 10 years ago
- A tool to detect and crash Cuckoo Sandbox☆295Updated last year
- ☆134Updated 6 years ago
- Live hunting of code injection techniques☆383Updated 6 years ago
- Parse YARA rules and operate over them more easily.☆191Updated 6 months ago
- An advanced memory forensics framework☆96Updated 5 years ago