Automatically create YARA rules from malicious documents.
☆211May 16, 2022Updated 3 years ago
Alternatives and similar repositories for halogen
Users that are interested in halogen are comparing it to the libraries listed below
Sorting:
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- YARA malware query accelerator (web frontend)☆437Feb 3, 2026Updated last month
- Awesome VirusTotal Intelligence Search Queries☆333May 16, 2023Updated 2 years ago
- Real-time, container-based file scanning at enterprise scale☆978Mar 6, 2026Updated 2 weeks ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- Automatic YARA rule generation for Malpedia☆168Sep 8, 2022Updated 3 years ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆585May 5, 2024Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- Re-play Security Events☆1,728Mar 20, 2024Updated 2 years ago
- Strelka Web UI for File Submission and Analysis☆75Feb 11, 2026Updated last month
- Malduck is your ducky companion in malware analysis journeys☆350Jun 22, 2025Updated 8 months ago
- Simple yara rule manager☆67Dec 27, 2022Updated 3 years ago
- Yara Rules for Modern Malware☆78Mar 3, 2024Updated 2 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Jul 13, 2018Updated 7 years ago
- ☆54Sep 6, 2020Updated 5 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Nov 13, 2022Updated 3 years ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆23Dec 12, 2021Updated 4 years ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆302Dec 27, 2023Updated 2 years ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆144Apr 20, 2023Updated 2 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆209Jul 21, 2022Updated 3 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Dec 16, 2023Updated 2 years ago
- YARI is an interactive debugger for YARA Language.☆90Sep 10, 2025Updated 6 months ago
- Repository of YARA rules made by Trellix ATR Team☆627Mar 18, 2025Updated last year
- ☆129Feb 2, 2025Updated last year
- Distributed malware processing framework based on Python, Redis and S3.☆465Updated this week
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆723Dec 26, 2022Updated 3 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆108Feb 12, 2023Updated 3 years ago
- Online hash checker for Virustotal and other services☆846Mar 21, 2025Updated last year
- Yara station is a management portal for Neo23x0-Loki. The mission is to transform the standalone nature of the Loki scanner into a centra…☆34Feb 1, 2022Updated 4 years ago
- Kaspersky's GReAT KLara☆733Jul 24, 2024Updated last year
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- Event Trace Log file parser in pure Python☆150Nov 27, 2020Updated 5 years ago
- ☆64Apr 1, 2021Updated 4 years ago
- Random hunting ordiented yara rules☆96Mar 27, 2023Updated 2 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- ☆98Oct 7, 2020Updated 5 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆116Mar 2, 2026Updated 2 weeks ago