Fnord
Pattern extractor
Extracts patterns from obfuscated code and generates YARA rules based on sequence statistics
Pattern Extractor for Obfuscated Code
297 stars
15 watching
45 forks
Language: Shell
last commit: almost 3 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
neo23x0/rules | A centralized repository of Yara rules for detecting malware and other malicious activities. | 10 |
neo23x0/yaranalyzer | Analyzes and reports on Yara rules and files | 362 |
neo23x0/yargen | Generates YARA rules from malware strings while excluding goodware strings and optionally refines the rules for AI use. | 1,569 |
michelcrypt4d4mus/yaralyzer | Analyzes binary and text data for YARA and regex matches, visualizes results with colors, and attempts to decode matched regions | 109 |
mrphrazer/obfuscation_detection | Automatically detects obfuscated code and other complex code constructs in binaries to aid reverse engineering. | 580 |
fboldewin/yara-rules | A collection of YARA rules used to identify malicious patterns in binary files | 62 |
neo23x0/god-mode-rules | Rules for detecting cyber threats in various attack vectors | 132 |
arieljt/vtcodesimilarity-yaragen | Automatically generates Yara rules to hunt for similar code samples based on VirusTotal's code similarity feature. | 96 |
neo23x0/yara-performance-guidelines | A guide providing performance optimization tips for YARA rules | 126 |
dissectmalware/base64_substring | Generates Yara rules to search for specific keywords in base64-encoded files | 41 |
utkonos/lst2x64dbg | Extracts labels from various binary analysis tools and exports an x64dbg database | 108 |
mrexodia/yaragen | Generates Yara rules from function basic blocks in debugged binary images | 35 |
nccgroup/yaml2yara | Automated generation of YARA rules from YAML input data | 22 |
darienhuss/shotgunyara | Tools and utilities for generating encoded versions of input data | 9 |
fox-it/mkyara | Automates generation of YARA rules from executable code | 205 |