YARA-PE-Features
Executable analysis presentation
A presentation project showcasing how to quickly analyze executable files using YARA and PE features
Slides from Cyber Defense Summit 2021
4 stars
2 watching
1 forks
last commit: over 3 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
| A Python interface to use YARA's features from Python programs | 665 |
| A tool to scan node modules for malicious scripts by applying YARA rules | 20 |
| A tool used to scan files and assets for malware using Yara signatures, offering incident response capabilities. | 104 |
| Analyzes PE files for security vulnerabilities and suspicious behavior | 1,024 |
| This repository contains signature files for detecting malicious software | 533 |
| Analyzing and exploiting IE 0day vulnerabilities to demonstrate rapid, deep, and accurate analysis methods | 6 |
| A modular host-based IOC scanner built around YARA pattern matching engine | 164 |
| An executable file analyzer tool that detects security, configuration, optimization, system, and format issues in Windows executables | 18 |
| A .NET wrapper for the yara threat intelligence analysis library, providing a simplified API for integrating yara into .NET projects. | 52 |
| A Rust-based slideshow tool with multiple display options and interactive features. | 22 |
| A tool to identify files containing sensitive information using YARA rules | 125 |
| An implementation of a PEiD-like tool with Yara rule analysis capabilities | 17 |
| Tool to create and match patterns for identifying malware samples | 8,370 |
| Analyzes files to detect malware and extract embedded content | 49 |
| An application backend designed to facilitate Yara rule analysis and root cause identification in malware detection. | 24 |