Threat Management
file-analysis

Other Tags in this Category

FEATURED

Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.

Reach out!

NEW

Yara rule generator using VirusTotal code similarity feature code-similar-to.

A threat intelligence domain/IP/hash threat feeds checker that checks IPVoid, URLVoid, Virustotal, and Cymon.

Search engine for Windows executable files and hashes, providing insights into file prevalence, behavior, and security information.

yarAnalyzer creates statistics on a yara rule set and files in a sample directory, generating tables and CSV files, including an inventory feature.

A tool designed to extract additional value from enterprise-wide AppCompat / AmCache data

Jager Logo

Jager

0 (0)

A tool for extracting IOCs from various input sources and converting them into JSON format.

A parsing tool for Yara Scan Service's JSON output file to help maximize benefits and automate parsing of Yara Scan Service results.

A tool to extract indicators of compromise from security reports in PDF format.

Collection of Yara rules for file identification and classification

Strelka Logo

Strelka

0 (0)

Real-time, container-based file scanning system for threat hunting and incident response.

A modular tool for collecting intelligence sources for files and outputting in CSV format.

LOKI Logo

LOKI

0 (0)

LOKI is a simple IOC and YARA Scanner for Indicators of Compromise Detection.

A collection of Yara rules for the Burp Yara-Scanner extension to identify malicious software on websites.

Advanced threat prevention and detection platform leveraging Deep CDR, Multiscanning, and Sandbox technologies to protect against data breaches and ransom attacks.

An Open Source solution for management of Threat Intelligence at scale, integrating multiple analyzers and malware analysis tools.

Halogen Logo

Halogen

0 (0)

Automatically create yara rules based on images embedded in office documents.

Open Source Intelligence solution for threat intelligence data enrichment and quick analysis of suspicious files or malware.