YARA package for Sublime Text
☆19Nov 30, 2025Updated 3 months ago
Alternatives and similar repositories for YaraSyntax
Users that are interested in YaraSyntax are comparing it to the libraries listed below
Sorting:
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- A tool to dynamically inspect macro execution in Office documents☆13Aug 13, 2016Updated 9 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Dec 24, 2019Updated 6 years ago
- Shared yara rules☆30Mar 17, 2014Updated 12 years ago
- yara rules for cryptography detection☆31Apr 28, 2014Updated 11 years ago
- A free and open source Hyperion deobfuscator.☆17Nov 17, 2022Updated 3 years ago
- Simple Distributed IOC Scanner☆12Jul 27, 2015Updated 10 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Telnet implementation for node.js, based on node-telnet☆18Sep 3, 2015Updated 10 years ago
- Validates yara rules and tries to repair the broken ones.☆41Sep 5, 2020Updated 5 years ago
- Yara syntax highlighting☆25Sep 4, 2021Updated 4 years ago
- A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work.☆18Sep 10, 2023Updated 2 years ago
- Tool for analysis of Windows Prefetch files☆26Nov 11, 2018Updated 7 years ago
- Simple development DNS server written in python☆26Dec 19, 2017Updated 8 years ago
- Quickly generate snort rules for IOCs☆18Oct 21, 2015Updated 10 years ago
- ☆17Mar 22, 2018Updated 7 years ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆102Jan 11, 2022Updated 4 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Mar 11, 2016Updated 10 years ago
- A browser extension that seamlessly integrates your yara match notifications into VirusTotal Intelligence.☆17Feb 8, 2015Updated 11 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Oct 3, 2015Updated 10 years ago
- python-csp provides python with communicating sequential processes style parallelism☆12Jul 13, 2021Updated 4 years ago
- Bash script for checking HTTP headers for security☆17Jan 16, 2014Updated 12 years ago
- Simple list of decrypt tools that could help recover data encrypted by ransomwares☆17Apr 1, 2016Updated 9 years ago
- Python connector library for communicating with a U2FVAL server☆15Apr 7, 2017Updated 8 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Dec 24, 2018Updated 7 years ago
- Scalable Binary Data Extraction in Hadoop☆144Jul 14, 2014Updated 11 years ago
- Web based Manager for Yara Rules☆58Mar 9, 2020Updated 6 years ago
- My Yara Rules Collection☆52Feb 7, 2016Updated 10 years ago
- Mattermost - Shodan Slash command☆31Jan 25, 2017Updated 9 years ago
- Scripts for ElasticSearch vulns☆13Oct 17, 2015Updated 10 years ago
- PoC compilation of libyara into WASM, for potential future CyberChef integration☆14Sep 18, 2022Updated 3 years ago
- Yaras Random☆24Feb 21, 2019Updated 7 years ago
- Implementation of bcrypt password hashing scheme☆12Jan 11, 2021Updated 5 years ago
- IDATACO IDA Pro Plugin☆46Jun 14, 2016Updated 9 years ago
- A (Miasm2 + binaryninja) based function divination.☆15Oct 22, 2017Updated 8 years ago
- Yara rules for quick reverse engineering of malware.☆19Dec 9, 2015Updated 10 years ago
- Django web interface for managing Yara rules☆196Jul 28, 2018Updated 7 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago