iomoath / yara-scanner
YaraScanner is a file pattern-matching tool based on YARA rules.
☆56Updated last year
Alternatives and similar repositories for yara-scanner:
Users that are interested in yara-scanner are comparing it to the libraries listed below
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Python based CLI for MalwareBazaar☆36Updated 2 months ago
- YARA rule analyzer to improve rule quality and performance☆96Updated last month
- Automatic detection engineering technical state compliance☆53Updated 6 months ago
- Links to malware-related YARA rules☆14Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆84Updated 2 years ago
- Standardized Malware Analysis Tool☆52Updated 3 years ago
- Yara Based Detection Engine for web browsers☆47Updated 3 years ago
- Import specific data sources into the Sigma generic and open signature format.☆77Updated 2 years ago
- Library of threat hunts to get any user started!☆41Updated 4 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- ☆44Updated last year
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated 9 months ago
- Automated detection rule analysis utility☆29Updated 2 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆53Updated 4 years ago
- Scripts and lists to help generate YARA friendly string mutations☆19Updated last year
- ☆64Updated last week
- Repository with selected IOCs and YARA rules for threat hunting.☆35Updated last month
- ☆37Updated 3 years ago
- C# Desktop GUI application that either performs YARA scan locally or prepares the scan in Active Directory domain environment with a few …☆32Updated 3 years ago
- Reads and prints information from the website MalAPI.io☆19Updated 2 years ago
- Initial triage of Windows Event logs☆95Updated 7 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆75Updated last year
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- Random hunting ordiented yara rules☆95Updated last year
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆56Updated last month
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆27Updated 10 months ago
- Collection of YARA signatures from individual research☆42Updated last year
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆64Updated 11 months ago
- ☆15Updated 3 years ago