Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
-
Updated
Oct 27, 2024 - YARA
Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
Set of Yara rules for finding files using magics headers
Visually inspect and force decode YARA and regex matches found in both binary and text data. With Colors.
yara detection rules for hunting with the threathunting-keywords project
C# wrapper around the Yara pattern matching library
Automatic generation of YARA rules from sample files.
A script to collect (the most famous) Yara rules from more than 150 free resources. Free alternative to: https://valhalla.nextron-systems.com/
An ongoing collection of awesome tools and frameworks, best security software practices, libraries, learning tutorials, frameworks, academic and practical resources about YARA in cybersecurity
Audit Node Module folder with YARA rules to identify possible malicious packages hiding in node_moudles
YARA rules for malware detection
Factual rules are YARA rules to find legitimate software on raw disk acquisition.
THAMARA - Threat Hunting with AMSI and YARA
Aegis - Flask web interface for scanning files with YARA
The pattern matching swiss knife
A collection of yara rules that can be used for forensics (non malware) cases but also some other rules
Add a description, image, and links to the yara-forensics topic page so that developers can more easily learn about it.
To associate your repository with the yara-forensics topic, visit your repo's landing page and select "manage topics."