fr0gger / Yara-Unprotect
This repository regroups the Yara Rules for the Unprotect Project
☆24Updated 4 years ago
Alternatives and similar repositories for Yara-Unprotect:
Users that are interested in Yara-Unprotect are comparing it to the libraries listed below
- Steezy - Ghetto Yara Generation☆15Updated 2 years ago
- A collection of my public YARA signatures for various malware families☆29Updated 6 months ago
- Plugins for the Viper Framework☆14Updated 5 years ago
- Yara rules for quick reverse engineering of malware.☆19Updated 9 years ago
- Handy scripts to speed up malware analysis☆35Updated last year
- Generate bulk YARA rules from YAML input☆22Updated 5 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Updated 8 years ago
- Yara rules for detecting malware☆23Updated 7 months ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 6 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 3 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Updated 4 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆29Updated 3 months ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆38Updated 2 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 6 years ago
- Generates YARA rules to detect malware using API hashing☆17Updated 4 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- Python 3 library to build YARA rules.☆13Updated 3 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 8 years ago
- TA505 unpacker Python 2.7☆47Updated 4 years ago
- Event Log Analysis Tools☆29Updated 8 years ago
- Some rules, scripts of some use to us☆9Updated 5 months ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Updated 7 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆11Updated last year
- ☆12Updated 3 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- ☆13Updated 4 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated last year
- Command-line Interface for Binar.ly☆37Updated 8 years ago
- Network detector for Winnti malware☆20Updated 7 years ago