factual-rules-generator
Software identifier
Generates YARA rules to identify installed software on a machine based on collected digital forensic evidence
Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.
76 stars
10 watching
6 forks
Language: Python
last commit: about 3 years ago
Linked from 1 awesome list
computer-forensicsdfiryarayara-rules
Related projects:
Repository | Description | Stars |
---|---|---|
| Validates Yara rules and tries to repair broken ones | 39 |
| Automates the creation of Yara rules from machine learning models trained on malware and benign samples. | 214 |
| Automatically generates YARA rules from sample files for malware analysis | 28 |
| Generates YARA rules from malware strings while excluding goodware strings and optionally refines the rules for AI use. | 1,569 |
| An automatic procedure to generate YARA rules from a set of malware reports | 62 |
| Automated generation of YARA rules from YAML input data | 22 |
| A collection of YARA rules based on intelligence profiles and file work. | 19 |
| A repository of custom Yara rules for malware analysis and threat intelligence | 18 |
| Automates the creation of Yara rules to detect malware and other malicious objects of interest by analyzing sample files from various sources. | 332 |
| A collection of YARA rules for detecting malware and suspicious activity in various environments. | 11 |
| Automated rule generation tool for malware analysis using biclustering algorithm | 61 |
| A curated collection of YARA rules for identifying and flagging malicious code and behavior. | 60 |
| A repository of pre-defined YARA rules for detecting malware and other malicious software | 126 |
| A collection of Yara rules for detecting malicious code and behavior | 11 |
| Provides Yara rules to identify malicious software in web applications | 44 |