yara
Malware analyzer
A plugin that enables malware analysis using the YARA ruleset
Malice Yara Plugin
30 stars
7 watching
11 forks
Language: YARA
last commit: about 5 years ago
Linked from 1 awesome list
dockergolangmalicemalice-pluginmalwaremalware-analysismalware-analyzermalware-detectionmalware-researchpluginyara
Related projects:
Repository | Description | Stars |
---|---|---|
uppusaikiran/yara-finder | Tools to detect and analyze malware using Yara rules | 1 |
securitymagic/yara | A collection of YARA rules for detecting malware and suspicious activity in various environments. | 11 |
f0wl/yara_rules | A collection of YARA rules for malware analysis and threat intelligence | 10 |
bartblaze/yara-rules | A collection of Yara rules for detecting malware and other threats | 327 |
yara-silly-silly/yarasilly2 | Automatically generates YARA rules from sample files for malware analysis | 28 |
yara-rules/yara-endpoint | A tool used to scan files and assets for malware using Yara signatures, offering incident response capabilities. | 104 |
tenable/yara-rules | A curated collection of YARA rules for identifying and flagging malicious code and behavior. | 60 |
xen0ph0n/yaragenerator | Automates the creation of Yara rules to detect malware and other malicious objects of interest by analyzing sample files from various sources. | 332 |
justicerage/yara | A tool for identifying and classifying malware samples based on textual or binary patterns | 7 |
rjzak/decompressingyara | A tool for decompressing malware samples and running Yara rules against them. | 7 |
virustotal/yara-python | A Python interface to a popular malware analysis tool | 660 |
h3x2b/yara-rules | Rules and patterns used to identify malicious software | 23 |
advanced-threat-research/yara-rules | A collection of rules to detect and prevent malware infections using YARA-based threat intelligence | 570 |
deadbits/yara-rules | A collection of YARA signatures used to detect and analyze malware | 42 |
imp0rtp3/yara-rules | A repository of custom Yara rules for malware analysis and threat intelligence | 18 |