☆64Apr 1, 2021Updated 4 years ago
Alternatives and similar repositories for yarix
Users that are interested in yarix are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- YARA malware query accelerator (web frontend)☆437Feb 3, 2026Updated last month
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆97Jan 13, 2026Updated 2 months ago
- Cross-Architecture Function Similarity Search Model - https://arxiv.org/abs/2310.03605☆14Oct 6, 2023Updated 2 years ago
- ☆19Oct 23, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Alternative YARA scanning engine☆73Aug 23, 2022Updated 3 years ago
- Yara rules☆22Mar 27, 2023Updated 3 years ago
- Automatic YARA rule generation for Malpedia☆168Sep 8, 2022Updated 3 years ago
- Yara station is a management portal for Neo23x0-Loki. The mission is to transform the standalone nature of the Loki scanner into a centra…☆34Feb 1, 2022Updated 4 years ago
- Merge all Yara rules from official Yara github repository in one .yar file☆31Jun 22, 2018Updated 7 years ago
- Royal Road RTF Weaponizer object decoder☆24Sep 26, 2024Updated last year
- ☆15Nov 25, 2021Updated 4 years ago
- Capa analysis importer for Ghidra.☆64Dec 2, 2020Updated 5 years ago
- Various capabilities for static malware analysis.☆80Sep 4, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Security ML models encoded as Yara rules☆215Jul 6, 2023Updated 2 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- Django web interface for managing Yara rules☆196Jul 28, 2018Updated 7 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- Simple yara rule manager☆67Dec 27, 2022Updated 3 years ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Dec 11, 2020Updated 5 years ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- Parse YARA rules and operate over them more easily.☆195Feb 6, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A Binary Genetic Traits Lexer Framework☆525Updated this week
- Kaspersky's GReAT KLara☆733Jul 24, 2024Updated last year
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14May 31, 2020Updated 5 years ago
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 4 months ago
- Analyses in IDA/Hex-Rays☆87Apr 6, 2023Updated 2 years ago
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 4 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- TAPIR is a multi-user, client/server, incident response framework☆47Jul 7, 2022Updated 3 years ago
- Open KLara Project☆36Feb 12, 2026Updated last month
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Jan 9, 2023Updated 3 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Nov 30, 2020Updated 5 years ago
- Python bindings for the Zydis disassembler library☆17Jul 2, 2019Updated 6 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆117Mar 2, 2026Updated 3 weeks ago
- ☆12May 6, 2020Updated 5 years ago