Tools and techniques for analyzing, reverse-engineering, and understanding malicious software. Task: Threat Intelligence
Explore 14 curated tools and resources
A project providing open-source YARA rules for malware and malicious file detection
A collection of YARA rules for public use, built from intelligence profiles and file work.
A minimal library to generate YARA rules from JAVA with maven support.
A program to extract IOCs from text files using regular expressions
KLara is a distributed system written in Python that helps Threat Intelligence researchers hunt for new malware using Yara.
Repository of scripts, signatures, and IOCs related to various malware analysis topics.
Bindings for the Yara library from VirusTotal with support for Yara v4.2 and various features like rule compilation and scanning.
Define and validate YARA rule metadata with CCCS YARA Specification.
An online hash checker utility that retrieves information from various online sources, including Virustotal, HybridAnalysis, and more.
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
Python 3 tool for parsing Yara rules with ongoing development.
A collection of publicly available YARA rules for detecting and classifying malware.
Detect capabilities in executable files and identify potential behaviors.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.