Fnord
Pattern extractor
Extracts patterns from obfuscated code and generates YARA rules based on sequence statistics
Pattern Extractor for Obfuscated Code
297 stars
15 watching
45 forks
Language: Shell
last commit: over 3 years ago
Linked from 1 awesome list
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | A centralized repository of Yara rules for detecting malware and other malicious activities. | 10 |
| | Analyzes and reports on Yara rules and files | 362 |
| | Generates YARA rules from malware strings while excluding goodware strings and optionally refines the rules for AI use. | 1,569 |
| | Analyzes binary and text data for YARA and regex matches, visualizes results with colors, and attempts to decode matched regions | 109 |
| | Automatically detects obfuscated code and other complex code constructs in binaries to aid reverse engineering. | 580 |
| | A collection of YARA rules used to identify malicious patterns in binary files | 62 |
| | Rules for detecting cyber threats in various attack vectors | 132 |
| | Automatically generates Yara rules to hunt for similar code samples based on VirusTotal's code similarity feature. | 96 |
| | A guide providing performance optimization tips for YARA rules | 126 |
| | Generates Yara rules to search for specific keywords in base64-encoded files | 41 |
| | Extracts labels from various binary analysis tools and exports an x64dbg database | 108 |
| | Generates Yara rules from function basic blocks in debugged binary images | 35 |
| | Automated generation of YARA rules from YAML input data | 22 |
| | Tools and utilities for generating encoded versions of input data | 9 |
| | Automates generation of YARA rules from executable code | 205 |