audit-node-modules-with-yara
Module scanner
A tool to scan node modules for malicious scripts by applying YARA rules
Audit Node Module folder with YARA rules to identify possible malicious packages hiding in node_moudles
20 stars
3 watching
1 forks
Language: YARA
last commit: over 4 years ago
Linked from 1 awesome list
malware-analysisnode-jsnode-modulenode-securitynode-security-programnodejsnodesecuritystatic-analysisyara-forensicsyara-rulesyara-scanner
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | A collection of YARA rules for detecting malware and suspicious activity in various environments. | 11 |
| | A tool used to scan files and assets for malware using Yara signatures, offering incident response capabilities. | 104 |
| | Provides bindings for YARA, allowing Node.js to interface with the YARA rule compilation and scanning functionality. | 13 |
| | Tool to create and match patterns for identifying malware samples | 8,370 |
| | A curated collection of YARA rules for identifying and flagging malicious code and behavior. | 60 |
| | Automates the creation of Yara rules to detect malware and other malicious objects of interest by analyzing sample files from various sources. | 332 |
| | An application backend designed to facilitate Yara rule analysis and root cause identification in malware detection. | 24 |
| | A plugin that enables malware analysis using the YARA ruleset | 30 |
| | A Python interface to use YARA's features from Python programs | 665 |
| | A collection of YARA rules designed to identify known malware and threats | 15 |
| | Tools to detect and analyze malware using Yara rules | 2 |
| | A collection of YARA rules for detecting and identifying malware and other security threats | 776 |
| | A collection of Yara rules for detecting malware and other threats | 336 |
| | A collection of YARA rules for malware analysis and threat intelligence | 10 |
| | A utility that integrates Yara pattern scanning into Windows' right-click menu, allowing users to scan files and folders for malware patterns. | 35 |