Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
-
Updated
Dec 8, 2024 - YARA
Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
Set of Yara rules for finding files using magics headers
Visually inspect and force decode YARA and regex matches found in both binary and text data. With Colors.
yara detection rules for hunting with the threathunting-keywords project
C# wrapper around the Yara pattern matching library
Automatic generation of YARA rules from sample files.
A script to collect (the most famous) Yara rules from more than 150 free resources. Free alternative to: https://valhalla.nextron-systems.com/
Audit Node Module folder with YARA rules to identify possible malicious packages hiding in node_moudles
Factual rules are YARA rules to find legitimate software on raw disk acquisition.
An ongoing collection of awesome tools and frameworks, best security software practices, libraries, learning tutorials, frameworks, academic and practical resources about YARA in cybersecurity
YARA rules for malware detection
A collection of yara rules that can be used for forensics (non malware) cases but also some other rules
Aegis - Flask web interface for scanning files with YARA
THAMARA - Threat Hunting with AMSI and YARA
The pattern matching swiss knife
Add a description, image, and links to the yara-forensics topic page so that developers can more easily learn about it.
To associate your repository with the yara-forensics topic, visit your repo's landing page and select "manage topics."