Tools for inspecting YARA bytecode
☆21Jul 1, 2020Updated 5 years ago
Alternatives and similar repositories for yara-rules-re
Users that are interested in yara-rules-re are comparing it to the libraries listed below
Sorting:
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- ssdeep for python on windows☆19Feb 7, 2026Updated last month
- Detection Rule License (DRL)☆21Dec 27, 2024Updated last year
- Authenticode-parser is a simple C library for Authenticode format parsing using OpenSSL.☆25Mar 2, 2024Updated 2 years ago
- ☆46Jun 1, 2023Updated 2 years ago
- Trigram database written in C++, suited for malware indexing☆130Jan 26, 2026Updated last month
- Scripts and lists to help generate YARA friendly string mutations☆22Apr 9, 2023Updated 2 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- Exercises from Designing BSD Rootkits working in 2020 with FreeBSD 12.2☆51Nov 11, 2022Updated 3 years ago
- Network detector for Winnti malware☆21Mar 6, 2018Updated 8 years ago
- ☆98Oct 7, 2020Updated 5 years ago
- CAPE Auto-Hardened Installer☆26Jan 28, 2026Updated last month
- VSCode extension for the YARA pattern matching language☆63Jan 10, 2024Updated 2 years ago
- Machine Interrogation To Identify Gaps & Techniques for Execution☆33Jul 12, 2022Updated 3 years ago
- YARA Language Server☆74Feb 3, 2026Updated last month
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆33Jan 14, 2026Updated last month
- Alternative YARA scanning engine☆73Aug 23, 2022Updated 3 years ago
- Django with Data Science [Video], published by Packt☆12Dec 15, 2025Updated 2 months ago
- ☆128Feb 2, 2025Updated last year
- Collection of YARA rules designed for usage through VirusTotal.com.☆85Apr 4, 2024Updated last year
- Plugin for x64dbg to generate Yara rules from function basic blocks.☆37Sep 2, 2017Updated 8 years ago
- NoMoreStealers is a Windows file system minifilter driver that protects sensitive user data from untrusted processes.☆97Nov 7, 2025Updated 4 months ago
- Detection in the form of Yara, Snort and ClamAV signatures.☆249Nov 1, 2024Updated last year
- server for indexing and querying passive DNS observations☆50Jan 12, 2026Updated last month
- Reads and prints information from the website MalAPI.io☆39Jan 18, 2022Updated 4 years ago
- grap: define and match graph patterns within binaries☆155May 5, 2022Updated 3 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- Lossless image minification using TinyPNG☆10May 25, 2019Updated 6 years ago
- A phishing detect system with NLP/OCR/HTML features☆11Apr 2, 2018Updated 7 years ago
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 3 months ago
- UEFI signing tools for Linux -- Forked to support AWS CloudHSM☆13Aug 25, 2021Updated 4 years ago
- A Windows information stealer / credential stealer written in Go for security research and malware analysis. Demonstrates browser passwo…☆26Dec 15, 2025Updated 2 months ago
- Exactly what the title says.☆13Feb 2, 2021Updated 5 years ago
- Python based CLI for MalwareBazaar☆39Jul 22, 2025Updated 7 months ago
- POC for CVE-2023-29360☆12Aug 31, 2024Updated last year
- Detection rule validation☆40Oct 25, 2023Updated 2 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 5 years ago
- ☆11Apr 25, 2021Updated 4 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago