YARA-PE-Features

Executable analysis presentation

A presentation project showcasing how to quickly analyze executable files using YARA and PE features

Slides from Cyber Defense Summit 2021

GitHub

4 stars
2 watching
1 forks
last commit: about 3 years ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
virustotal/yara-python A Python interface to a popular malware analysis tool 660
rpgeeganage/audit-node-modules-with-yara A tool to scan node modules for malicious scripts by applying YARA rules 20
yara-rules/yara-endpoint A tool used to scan files and assets for malware using Yara signatures, offering incident response capabilities. 104
justicerage/manalyze Analyzes PE files for security vulnerabilities and suspicious behavior 1,018
chronicle/gcti This repository contains signature files for detecting malicious software 526
exp-sky/xkungfoo-2013 Analyzing and exploiting IE 0day vulnerabilities to demonstrate rapid, deep, and accurate analysis methods 6
spyre-project/spyre A modular host-based IOC scanner built around YARA pattern matching engine 164
dragon-dreamer/binary-valentine An executable file analyzer tool that detects security, configuration, optimization, system, and format issues in Windows executables 16
microsoft/libyara.net A .NET wrapper for the yara threat intelligence analysis library, providing a simplified API for integrating yara into .NET projects. 51
yazgoo/bema A Rust-based slideshow tool with multiple display options and interactive features. 22
diablohorn/yara4pentesters A tool to identify files containing sensitive information using YARA rules 124
k-atc/peid An implementation of a PEiD-like tool with Yara rule analysis capabilities 17
virustotal/yara A tool for creating pattern matching rules to identify and classify malware samples 8,300
lprat/static_file_analysis Analyzes files to detect malware and extract embedded content 49
dissectmalware/yaradbg-backend An application backend designed to facilitate Yara rule analysis and root cause identification in malware detection. 24