Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.
Reach out!
Yara rule generator using VirusTotal code similarity feature code-similar-to.
A threat intelligence domain/IP/hash threat feeds checker that checks IPVoid, URLVoid, Virustotal, and Cymon.
Search engine for Windows executable files and hashes, providing insights into file prevalence, behavior, and security information.
yarAnalyzer creates statistics on a yara rule set and files in a sample directory, generating tables and CSV files, including an inventory feature.
A tool designed to extract additional value from enterprise-wide AppCompat / AmCache data
A tool for extracting IOCs from various input sources and converting them into JSON format.
A parsing tool for Yara Scan Service's JSON output file to help maximize benefits and automate parsing of Yara Scan Service results.
A tool to extract indicators of compromise from security reports in PDF format.
Collection of Yara rules for file identification and classification
Real-time, container-based file scanning system for threat hunting and incident response.
Official repository of YARA rules for threat detection and hunting
A modular tool for collecting intelligence sources for files and outputting in CSV format.
LOKI is a simple IOC and YARA Scanner for Indicators of Compromise Detection.
A collection of Yara rules for the Burp Yara-Scanner extension to identify malicious software on websites.
Advanced threat prevention and detection platform leveraging Deep CDR, Multiscanning, and Sandbox technologies to protect against data breaches and ransom attacks.
An Open Source solution for management of Threat Intelligence at scale, integrating multiple analyzers and malware analysis tools.
Automatically create yara rules based on images embedded in office documents.
Open Source Intelligence solution for threat intelligence data enrichment and quick analysis of suspicious files or malware.