Tools and techniques for analyzing, reverse-engineering, and understanding malicious software. Task: Threat Intelligence
Explore 14 curated tools and resources
A project providing open-source YARA rules for malware and malicious file detection
A collection of YARA rules for public use, built from intelligence profiles and file work.
A minimal library to generate YARA rules from JAVA with maven support.
A program to extract IOCs from text files using regular expressions
KLara is a distributed system written in Python that helps Threat Intelligence researchers hunt for new malware using Yara.
Repository of scripts, signatures, and IOCs related to various malware analysis topics.
Bindings for the Yara library from VirusTotal with support for Yara v4.2 and various features like rule compilation and scanning.
Define and validate YARA rule metadata with CCCS YARA Specification.
An online hash checker utility that retrieves information from various online sources, including Virustotal, HybridAnalysis, and more.
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
Python 3 tool for parsing Yara rules with ongoing development.
A collection of publicly available YARA rules for detecting and classifying malware.
Detect capabilities in executable files and identify potential behaviors.
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.