ruppde / yara_rules
Yara rules
☆21Updated 2 years ago
Alternatives and similar repositories for yara_rules:
Users that are interested in yara_rules are comparing it to the libraries listed below
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Updated 3 years ago
- ☆34Updated 2 years ago
- ☆14Updated 2 years ago
- Generate YARA rules for OOXML documents.☆38Updated last year
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 3 years ago
- Collection of scripts used to analyse malware or emails☆19Updated 4 years ago
- ☆15Updated 3 years ago
- ☆20Updated last month
- ☆33Updated 3 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated last year
- Generates YARA rules to detect malware using API hashing☆17Updated 4 years ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- Just Another broken Registry Parser (JARP)☆16Updated 10 months ago
- Links to malware-related YARA rules☆15Updated 2 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- Python emulator for Excel XLM macros.☆18Updated 4 years ago
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆13Updated 2 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34Updated 3 years ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆26Updated 2 years ago
- C# User Simulation☆32Updated 2 years ago
- DFIR notes for Citrix ADC (NetScaler) appliances vulnerable to CVE-2019-19781☆45Updated 5 years ago
- ☆22Updated 4 years ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆13Updated last year
- ☆27Updated 3 years ago
- ☆44Updated last year
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year