Fnord

Pattern extractor

Extracts patterns from obfuscated code and generates YARA rules based on sequence statistics

Pattern Extractor for Obfuscated Code

GitHub

296 stars
15 watching
45 forks
Language: Shell
last commit: almost 3 years ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
neo23x0/rules A centralized repository of Yara rules for detecting malware and other malicious activities. 10
neo23x0/yaranalyzer Analyzes and reports on Yara rules and files 359
neo23x0/yargen Generates YARA rules from malware strings while excluding goodware strings and optionally refines the rules for AI use. 1,555
michelcrypt4d4mus/yaralyzer Analyzes binary and text data for YARA and regex matches, visualizes results with colors, and attempts to decode matched regions 107
mrphrazer/obfuscation_detection Automatically detects obfuscated code and other complex code constructs in binaries to aid reverse engineering. 575
fboldewin/yara-rules A collection of YARA rules used to identify malicious patterns in binary files 61
neo23x0/god-mode-rules Rules for detecting cyber threats in various attack vectors 131
arieljt/vtcodesimilarity-yaragen Automatically generates Yara rules to hunt for similar code samples based on VirusTotal's code similarity feature. 96
neo23x0/yara-performance-guidelines A guide providing performance optimization tips for YARA rules 126
dissectmalware/base64_substring Generates Yara rules to search for specific keywords in base64-encoded files 40
utkonos/lst2x64dbg Extracts labels from various binary analysis tools and exports an x64dbg database 107
mrexodia/yaragen Generates Yara rules from function basic blocks in debugged binary images 35
nccgroup/yaml2yara Automates rule generation from YAML data to detect specific security threats 22
darienhuss/shotgunyara Tools and utilities for generating encoded versions of input data 9
fox-it/mkyara Automates generation of YARA rules from executable code 203