hillu / yara-rules-re
Tools for inspecting YARA bytecode
☆15Updated 4 years ago
Alternatives and similar repositories for yara-rules-re:
Users that are interested in yara-rules-re are comparing it to the libraries listed below
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- Imphash-like calculation on Golang binaries☆49Updated 2 years ago
- A collection of shellcode hashes☆17Updated 6 years ago
- Generates YARA rules to detect malware using API hashing☆17Updated 4 years ago
- TA505 unpacker Python 2.7☆47Updated 4 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆38Updated 2 years ago
- ☆23Updated 4 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 3 years ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Updated 2 years ago
- Capa analysis importer for Ghidra.☆61Updated 4 years ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago
- ☆27Updated 5 years ago
- Radare2 Metadata Extraction to Elasticsearch☆22Updated 11 months ago
- ☆71Updated last year
- A sinkhole for collecting and analysing malicious traffic☆17Updated 4 years ago
- ☆18Updated 4 years ago
- Royal Road RTF Weaponizer object decoder☆24Updated 6 months ago
- Flare-On solutions☆36Updated 5 years ago
- ☆13Updated 4 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- Steezy - Ghetto Yara Generation☆15Updated 2 years ago
- ☆23Updated 5 years ago
- Specialized tool to dump Position Independent Code.☆22Updated 4 years ago
- ☆51Updated 6 years ago
- TrashDBG the world's worse debugger☆23Updated 3 years ago
- Winbindex bot to pull in binaries for specific releases☆47Updated last year
- Generate YARA rules for OOXML documents.☆38Updated last year
- ☆26Updated last year
- Malware Configuration Extraction Modules☆49Updated last year
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆40Updated 5 years ago