naxonez / YaraRulesLinks
Yaras Random
☆21Updated 6 years ago
Alternatives and similar repositories for YaraRules
Users that are interested in YaraRules are comparing it to the libraries listed below
Sorting:
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago
- Handy scripts to speed up malware analysis☆35Updated 2 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆77Updated 10 years ago
- TA505 unpacker Python 2.7☆47Updated 5 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Plugins for the Viper Framework☆14Updated 6 years ago
- Generates YARA rules to detect malware using API hashing☆17Updated 4 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 7 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆37Updated 2 years ago
- ☆29Updated 8 years ago
- A Maltego transform for VirusTotal Submitter Information☆35Updated 6 years ago
- ☆15Updated 4 years ago
- Steezy - Ghetto Yara Generation☆15Updated 2 years ago
- This repository regroups the Yara Rules for the Unprotect Project☆26Updated 4 years ago
- Telsy CTI Research Team☆57Updated 4 years ago
- ☆13Updated 4 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- ☆23Updated 6 years ago
- QEMU with rVMI extensions☆25Updated 8 years ago
- Yara rules for quick reverse engineering of malware.☆19Updated 9 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆11Updated last year
- Scripts for communication with Bunitu Trojan C&Cs☆19Updated 9 years ago
- A tool to generate yara signatures from function blocks☆19Updated 10 years ago
- Use this library to automatically extract PE files compressed with aplib from a binary blob.☆34Updated 6 years ago
- Print the strings of encoded printable characters in files☆12Updated 10 years ago
- Malware analyses and helpful scripts☆29Updated 3 years ago
- Analysis PE file or Shellcode☆50Updated 9 years ago
- ☆23Updated 4 years ago
- ☆44Updated 5 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆27Updated 9 years ago