YARA-PE-Features
Executable analysis presentation
A presentation project showcasing how to quickly analyze executable files using YARA and PE features
Slides from Cyber Defense Summit 2021
4 stars
2 watching
1 forks
last commit: about 4 years ago
Linked from 1 awesome list
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | A Python interface to use YARA's features from Python programs | 665 |
| | A tool to scan node modules for malicious scripts by applying YARA rules | 20 |
| | A tool used to scan files and assets for malware using Yara signatures, offering incident response capabilities. | 104 |
| | Analyzes PE files for security vulnerabilities and suspicious behavior | 1,024 |
| | This repository contains signature files for detecting malicious software | 533 |
| | Analyzing and exploiting IE 0day vulnerabilities to demonstrate rapid, deep, and accurate analysis methods | 6 |
| | A modular host-based IOC scanner built around YARA pattern matching engine | 164 |
| | An executable file analyzer tool that detects security, configuration, optimization, system, and format issues in Windows executables | 18 |
| | A .NET wrapper for the yara threat intelligence analysis library, providing a simplified API for integrating yara into .NET projects. | 52 |
| | A Rust-based slideshow tool with multiple display options and interactive features. | 22 |
| | A tool to identify files containing sensitive information using YARA rules | 125 |
| | An implementation of a PEiD-like tool with Yara rule analysis capabilities | 17 |
| | Tool to create and match patterns for identifying malware samples | 8,370 |
| | Analyzes files to detect malware and extract embedded content | 49 |
| | An application backend designed to facilitate Yara rule analysis and root cause identification in malware detection. | 24 |