godaddy / yara-rules
YARA rules for use with ProcFilter
☆86Updated 7 years ago
Alternatives and similar repositories for yara-rules:
Users that are interested in yara-rules are comparing it to the libraries listed below
- PE Import Hash Generator☆75Updated 7 years ago
- BinSequencer is a script designed to find a common pattern of bytes within a set of samples and generate a YARA rule from the identified…☆76Updated 3 years ago
- My Yara Rules Collection☆52Updated 9 years ago
- Various Yara signatures (possibly to be included in a release later).☆86Updated 5 years ago
- Ursnif beacon decryptor☆27Updated 2 years ago
- Yara rules for quick reverse engineering of malware.☆19Updated 9 years ago
- A taxonomy and dictionary of malware behaviors.☆42Updated 5 years ago
- A Yara rule generator for finding related samples and hunting☆158Updated 2 years ago
- Lazy Office Analyzer☆119Updated 8 years ago
- Web based Manager for Yara Rules☆57Updated 5 years ago
- Handy scripts to speed up malware analysis☆35Updated last year
- Modified edition of cuckoo community modules☆32Updated 5 years ago
- TA505 unpacker Python 2.7☆47Updated 4 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆38Updated 2 years ago
- ☆82Updated 8 years ago
- ☆44Updated 6 years ago
- Telsy CTI Research Team☆57Updated 4 years ago
- a modified version base on Tracecorn☆20Updated 5 years ago
- Modified edition of cuckoo community modules☆50Updated 7 years ago
- A collection of my public YARA signatures for various malware families☆29Updated 6 months ago
- Random hunting ordiented yara rules☆95Updated last year
- Collection of YARA signatures from individual research☆44Updated last year
- Community modules for FAME☆65Updated last month
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Updated 5 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- Yara rules for malware families seen as part of targeted threats project☆137Updated 8 years ago
- A mapping of used malware names to commonly known family names☆62Updated 2 years ago
- Extract common Windows artifacts from source images and VSCs☆65Updated 3 years ago
- Yara rules to be used with the Burp Yara-Scanner extension☆47Updated 3 years ago
- Various scripts for different malware families☆105Updated 3 years ago