g-les / 100DaysofYARA
100 Days of YARA to be updated with rules & ideas as the year progresses
☆59Updated 2 years ago
Alternatives and similar repositories for 100DaysofYARA:
Users that are interested in 100DaysofYARA are comparing it to the libraries listed below
- YARA rule analyzer to improve rule quality and performance☆98Updated last week
- Yara Rules for Modern Malware☆76Updated last year
- Modular malware analysis artifact collection and correlation framework☆53Updated 11 months ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated last year
- ShellSweeping the evil.☆52Updated 10 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆76Updated last year
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- ☆27Updated 3 years ago
- Generate YARA rules for OOXML documents.☆38Updated last year
- JPCERT/CC public YARA rules repository☆106Updated 4 months ago
- Links to malware-related YARA rules☆15Updated 2 years ago
- ☆33Updated 3 years ago
- ☆34Updated 2 years ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago
- Simple PowerShell script to enable process scanning with Yara.☆93Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆76Updated 2 years ago
- runsc loads 32/64 bit shellcode (depending on how runsc is compiled) in a way that makes it easy to load in a debugger. This code is base…☆36Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Powershell sandboxing utility☆18Updated 2 weeks ago
- ☆15Updated 3 years ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆52Updated last year
- C2 Active Scanner☆55Updated 10 months ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- Contains compiled binaries of Volatility☆33Updated 2 months ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆44Updated 2 years ago
- Quick ESXi Log Parser☆17Updated 3 months ago
- A home for detection content developed by the delivr.to team☆67Updated 2 months ago
- Alternative YARA scanning engine☆70Updated 2 years ago