stvemillertime / ConventionEngine
ConventionEngine - A Yara Rulepack for PDB Path Hunting
☆36Updated last year
Related projects: ⓘ
- Telsy CTI Research Team☆57Updated 3 years ago
- Collection of YARA signatures from individual research☆41Updated 9 months ago
- Generate YARA rules for OOXML documents.☆37Updated last year
- TA505 unpacker Python 2.7☆45Updated 4 years ago
- Steezy - Ghetto Yara Generation☆15Updated last year
- Handy scripts to speed up malware analysis☆35Updated 11 months ago
- A collection of my public YARA signatures for various malware families☆28Updated last month
- Scripts, Yara rules and other files developed during malware investigations☆24Updated 2 years ago
- Links to malware-related YARA rules☆14Updated last year
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- A Maltego transform for VirusTotal vHash☆31Updated 4 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆28Updated 7 months ago
- a modified version base on Tracecorn☆20Updated 4 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆52Updated 6 years ago
- ☆25Updated last year
- Merge all Yara rules from official Yara github repository in one .yar file☆28Updated 6 years ago
- This repository regroups the Yara Rules for the Unprotect Project☆24Updated 3 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆39Updated 6 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 3 years ago
- Random hunting ordiented yara rules☆95Updated last year
- Malware similarity platform with modularity in mind.☆75Updated 3 years ago
- Standardized Malware Analysis Tool☆51Updated 3 years ago
- Generate bulk YARA rules from YAML input☆21Updated 4 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆82Updated last year
- Tracking APT IOCs☆24Updated 3 years ago
- ☆15Updated last year
- Scans a malware file and lists down the related MBC (Malware Behavior Catalog) details.☆19Updated 2 years ago
- Presentation materials for talks I've given.☆20Updated 4 years ago
- Trace ScriptBlock execution for powershell v2☆39Updated 4 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆30Updated 4 years ago