factual-rules-generator
Software identifier
Generates YARA rules to identify installed software on a machine based on collected digital forensic evidence
Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.
76 stars
10 watching
6 forks
Language: Python
last commit: almost 4 years ago
Linked from 1 awesome list
computer-forensicsdfiryarayara-rules
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | Validates Yara rules and tries to repair broken ones | 39 |
| | Automates the creation of Yara rules from machine learning models trained on malware and benign samples. | 214 |
| | Automatically generates YARA rules from sample files for malware analysis | 28 |
| | Generates YARA rules from malware strings while excluding goodware strings and optionally refines the rules for AI use. | 1,569 |
| | An automatic procedure to generate YARA rules from a set of malware reports | 62 |
| | Automated generation of YARA rules from YAML input data | 22 |
| | A collection of YARA rules based on intelligence profiles and file work. | 19 |
| | A repository of custom Yara rules for malware analysis and threat intelligence | 18 |
| | Automates the creation of Yara rules to detect malware and other malicious objects of interest by analyzing sample files from various sources. | 332 |
| | A collection of YARA rules for detecting malware and suspicious activity in various environments. | 11 |
| | Automated rule generation tool for malware analysis using biclustering algorithm | 61 |
| | A curated collection of YARA rules for identifying and flagging malicious code and behavior. | 60 |
| | A repository of pre-defined YARA rules for detecting malware and other malicious software | 126 |
| | A collection of Yara rules for detecting malicious code and behavior | 11 |
| | Provides Yara rules to identify malicious software in web applications | 44 |