g-les / macho_similarity
Conceptual Methods for Finding Commonalities in Macho Files
☆13Updated 11 months ago
Alternatives and similar repositories for macho_similarity:
Users that are interested in macho_similarity are comparing it to the libraries listed below
- Generates YARA rules to detect malware using API hashing☆17Updated 3 years ago
- Steezy - Ghetto Yara Generation☆15Updated last year
- Yara rules☆20Updated last year
- ☆13Updated 4 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 3 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Updated 3 years ago
- ☆15Updated 2 years ago
- ☆12Updated 3 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- ☆24Updated 2 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Updated 3 years ago
- ☆33Updated 3 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated last year
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 3 years ago
- Python 3 library to build YARA rules.☆13Updated 3 years ago
- ☆15Updated 3 years ago
- Generate YARA rules for OOXML documents.☆38Updated last year
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34Updated 3 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Updated 5 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Updated 7 years ago
- Indicators of Normality☆12Updated 2 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- This repository regroups the Yara Rules for the Unprotect Project☆24Updated 4 years ago
- NTFS file system specimens☆14Updated last year
- Python emulator for Excel XLM macros.☆18Updated 4 years ago
- Set of utilities for getting information about Windows Events☆15Updated 6 years ago
- ☆22Updated 4 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆29Updated last month
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated last year
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago