ruppde / yara_rules
Yara rules
☆20Updated last year
Alternatives and similar repositories for yara_rules:
Users that are interested in yara_rules are comparing it to the libraries listed below
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 3 years ago
- ☆15Updated 3 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Updated 3 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- ☆14Updated 2 years ago
- ☆34Updated 2 years ago
- Scripts and lists to help generate YARA friendly string mutations☆21Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- ☆20Updated last week
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated last year
- Threat Box Assessment Tool☆19Updated 3 years ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆26Updated 2 years ago
- Collection of scripts used to analyse malware or emails☆19Updated 4 years ago
- Python based CLI for MalwareBazaar☆36Updated 4 months ago
- Modular malware analysis artifact collection and correlation framework☆53Updated 10 months ago
- Links to malware-related YARA rules☆15Updated 2 years ago
- ☆33Updated 3 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated 11 months ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆13Updated last year
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆58Updated 2 years ago
- IcedID Decryption Tool☆28Updated 3 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- C# User Simulation☆32Updated 2 years ago
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆12Updated 2 years ago
- Generate YARA rules for OOXML documents.☆38Updated last year
- Generates YARA rules to detect malware using API hashing☆17Updated 4 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆36Updated last year
- ☆38Updated 3 years ago