Fnord
Pattern extractor
Extracts patterns from obfuscated code and generates YARA rules based on sequence statistics
Pattern Extractor for Obfuscated Code
297 stars
15 watching
45 forks
Language: Shell
last commit: about 3 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
| A centralized repository of Yara rules for detecting malware and other malicious activities. | 10 |
| Analyzes and reports on Yara rules and files | 362 |
| Generates YARA rules from malware strings while excluding goodware strings and optionally refines the rules for AI use. | 1,569 |
| Analyzes binary and text data for YARA and regex matches, visualizes results with colors, and attempts to decode matched regions | 109 |
| Automatically detects obfuscated code and other complex code constructs in binaries to aid reverse engineering. | 580 |
| A collection of YARA rules used to identify malicious patterns in binary files | 62 |
| Rules for detecting cyber threats in various attack vectors | 132 |
| Automatically generates Yara rules to hunt for similar code samples based on VirusTotal's code similarity feature. | 96 |
| A guide providing performance optimization tips for YARA rules | 126 |
| Generates Yara rules to search for specific keywords in base64-encoded files | 41 |
| Extracts labels from various binary analysis tools and exports an x64dbg database | 108 |
| Generates Yara rules from function basic blocks in debugged binary images | 35 |
| Automated generation of YARA rules from YAML input data | 22 |
| Tools and utilities for generating encoded versions of input data | 9 |
| Automates generation of YARA rules from executable code | 205 |