michelcrypt4d4mus / yaralyzer
Visually inspect and force decode YARA and regex matches found in both binary and text data. With Colors.
☆118Updated 3 months ago
Alternatives and similar repositories for yaralyzer:
Users that are interested in yaralyzer are comparing it to the libraries listed below
- Collection of rules created using YARA-Signator over Malpedia☆127Updated 4 months ago
- YARA rule analyzer to improve rule quality and performance☆97Updated 3 months ago
- A guide on how to write fast and memory friendly YARA rules☆141Updated last month
- YARI is an interactive debugger for YARA Language.☆87Updated 2 months ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆101Updated 3 weeks ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆127Updated last year
- Automatic YARA rule generation for Malpedia☆158Updated 2 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆139Updated last year
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- Python based CLI for MalwareBazaar☆36Updated 4 months ago
- JPCERT/CC public YARA rules repository☆106Updated 3 months ago
- Community modules for CAPE Sandbox☆92Updated this week
- volatility explorer☆91Updated 4 years ago
- File analysis and management framework.☆83Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023☆77Updated last year
- Lazarus analysis tools and research report☆55Updated last year
- Malware Configuration Extraction Modules☆49Updated last year
- Elastic Security Labs releases☆59Updated 4 months ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆58Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆85Updated 2 years ago
- Use YARA rules on Time Travel Debugging traces☆89Updated last year
- A C# based tool for analysing malicious OneNote documents☆111Updated last year
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 2 years ago
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆125Updated 2 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆165Updated 2 years ago
- Signature engine for all your logs☆166Updated last year
- Analysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules☆50Updated last year
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆44Updated 2 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆111Updated last year