Malware Analysis for Yara
Tools and techniques for analyzing, reverse-engineering, and understanding malicious software. Task: Yara
Explore 56 curated tools and resources
RELATED TASKS
LATEST ADDITIONS
A collection of Yara rules for identifying malicious PEs with unique or suspicious PDB paths.
Generates a YARA rule to match basic blocks of the current function in IDA Pro
A project providing open-source YARA rules for malware and malicious file detection
A semi-automatic tool to generate YARA rules from virus samples.
A free web-based Yara debugger for security analysts to write hunting or detection rules with ease.
A tool for signature analysis of RTF files to detect potentially unique parts and malicious documents.
Collects Yara rules from over 150 free resources, a free alternative to Valhalla.
A tool that generates Yara rules from training data using logistic regression and random forest classifiers.
Generate Yara rules from function basic blocks in x64dbg.
A simple framework for extracting actionable data from Android malware
YARA syntax highlighting for Gtk-based text editors
A collection of YARA rules for public use, built from intelligence profiles and file work.
A minimal library to generate YARA rules from JAVA with maven support.
YARA rules for ProcFilter to detect malware and threats
PINNED
InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
Fabric Platform by BlackStork
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
System Two Security
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.
Aikido Security
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.
Permiso
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.
Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.