t-tani / defender2yara
Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules
☆40Updated this week
Alternatives and similar repositories for defender2yara:
Users that are interested in defender2yara are comparing it to the libraries listed below
- ☆49Updated 3 months ago
- Monitors ETW for security relevant syscalls maintaining the set called by each unique process☆72Updated last year
- ☆23Updated last year
- Winbindex bot to pull in binaries for specific releases☆45Updated last year
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆115Updated 7 months ago
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆33Updated last month
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- ☆65Updated 2 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆53Updated 2 years ago
- A few examples of how to trap virtual memory access on Windows.☆26Updated last month
- Small visualizator for PE files☆67Updated last year
- ☆25Updated 3 months ago
- Report and exploit of CVE-2023-36427☆89Updated last year
- Extract data of TTD trace file to a minidump☆28Updated last year
- C# implementation to produce ROR-13 numeric hash for given function API name☆31Updated 5 years ago
- Inject unsigned DLL into Protected Process Light (PPL)☆18Updated 2 months ago
- Windows API Hashes used in the malwares☆40Updated 9 years ago
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆44Updated 3 months ago
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆47Updated 3 weeks ago
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆68Updated 9 months ago
- Finding Truth in the Shadows☆88Updated 2 years ago
- Enabled / Disable LSA Protection via BYOVD☆65Updated 3 years ago
- LPE exploit for CVE-2023-36802☆22Updated last year
- WslinkVMAnalyzer is a tool to facilitate analysis of code protected by a virtual machine featured in Wslink malware☆45Updated 2 years ago
- Inter-Process Communication Mechanisms☆26Updated 4 years ago
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆75Updated 6 months ago
- Analysis of the vulnerability☆49Updated last year
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆109Updated last year
- A small tool to unmap PE memory dumps.☆11Updated last year
- A simple but useful project maybe help you reverse Windows.☆35Updated 10 months ago