Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
-
Updated
May 19, 2024 - YARA
Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
All-in-One malware analysis tool.
An open source script to perform malware static analysis on Portable Executable
🐺 Malware analysis platform
A Malware classifier dataset built with header fields’ values of Portable Executable files
Extracted Yara rules from Windows Defender mpavbase and mpasbase
enumerate binary capabilities, including malicious behaviors
Yara Dockerfile
This tool maps a file's behavior on MITRE ATT&CK matrix.
Malice Yara Plugin
Analysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules
Collection of YARA signatures from individual research
Notes and IoCs of fresh malware
This repository contains a list of known YARA rules which researchers can use according to their needs.The repository is opensource and can be used by the end users as long as they follow the GNU GENERAL PUBLIC LICENSE V3.
Repository of Yara Rules created by TjNel
Yara rules written by me, for free use.
This repository contains dynamic and static tools for IoT malware analysis
YaraGuard is an advanced malware analysis tool designed to empower users in the relentless pursuit of securing digital environments. At its core, YaraGuard utilizes YARA rules, providing a sophisticated and effective means of scanning files for potential threats.
Add a description, image, and links to the malware-analysis topic page so that developers can more easily learn about it.
To associate your repository with the malware-analysis topic, visit your repo's landing page and select "manage topics."