binsequencer
Malware analyzer
Automates pattern detection and YARA rule generation for malware analysis
BinSequencer is a script designed to find a common pattern of bytes within a set of samples and generate a YARA rule from the identified pattern.
74 stars
5 watching
7 forks
Language: Python
last commit: about 3 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
| Automates the creation of Yara rules to detect malware and other malicious objects of interest by analyzing sample files from various sources. | 332 |
| Tools to detect and analyze malware using Yara rules | 2 |
| An application backend designed to facilitate Yara rule analysis and root cause identification in malware detection. | 24 |
| Tool to create and match patterns for identifying malware samples | 8,370 |
| Automatically generates YARA rules from sample files for malware analysis | 28 |
| A C# wrapper around the Yara pattern matching library for detecting malware and analyzing binaries | 36 |
| A collection of Yara rules for detecting malware and other threats | 336 |
| A tool to detect and analyze malicious code in process memory by executing Python scripts on YARA matches | 12 |
| Analyzes binary and text data for YARA and regex matches, visualizes results with colors, and attempts to decode matched regions | 109 |
| A web browser extension that intercepts and analyzes script requests to detect malware using YARA rules | 48 |
| A Python interface to use YARA's features from Python programs | 665 |
| A collection of YARA rules for detecting malware and suspicious activity in various environments. | 11 |
| A Yara ruleset and scanner tool for detecting webserver malware on Linux servers. | 102 |
| A web service for scanning files with Yara rules to detect malware and other threats | 27 |
| Automatically generates Yara rules to hunt for similar code samples based on VirusTotal's code similarity feature. | 96 |