Tools for identifying, assessing, and mitigating cyber threats across organizations. Task: File Analysis
Explore 18 curated tools and resources
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Yara rule generator using VirusTotal code similarity feature code-similar-to.
A threat intelligence domain/IP/hash threat feeds checker that checks IPVoid, URLVoid, Virustotal, and Cymon.
Search engine for Windows executable files and hashes, providing insights into file prevalence, behavior, and security information.
yarAnalyzer creates statistics on a yara rule set and files in a sample directory, generating tables and CSV files, including an inventory feature.
A tool designed to extract additional value from enterprise-wide AppCompat / AmCache data
A tool for extracting IOCs from various input sources and converting them into JSON format.
A parsing tool for Yara Scan Service's JSON output file to help maximize benefits and automate parsing of Yara Scan Service results.
A tool to extract indicators of compromise from security reports in PDF format.
Collection of Yara rules for file identification and classification
Real-time, container-based file scanning system for threat hunting and incident response.
Official repository of YARA rules for threat detection and hunting
A modular tool for collecting intelligence sources for files and outputting in CSV format.
LOKI is a simple IOC and YARA Scanner for Indicators of Compromise Detection.
A collection of Yara rules for the Burp Yara-Scanner extension to identify malicious software on websites.