A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work. This collection of YARA rules is designed to help identify and detect various types of malware and threats. It is intended for use by security professionals and researchers to aid in the detection and analysis of malware and other types of threats.
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
A Scriptable Android Debugger for reverse engineers and developers.
Generate Yara rules from function basic blocks in x64dbg.
Automatic analysis of malware behavior using machine learning.
A collection of resources for beginners to learn assembly language.
Scans running processes for potentially malicious implants and dumps them.
A script to detect and remove Canary Tokens with simple signature-based detections.