CDI_yara Logo

CDI_yara

0
Free
Visit Website

A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work. This collection of YARA rules is designed to help identify and detect various types of malware and threats. It is intended for use by security professionals and researchers to aid in the detection and analysis of malware and other types of threats.

FEATURES

ALTERNATIVES

Collection of malware persistence information and techniques

RABCDAsm is a collection of utilities for ActionScript 3 assembly/disassembly and SWF file manipulation.

A program to extract IOCs from text files using regular expressions

Interactive incremental disassembler with data/control flow analysis capabilities.

Command line tool for testing CRLF injection on a list of domains.

An open-source binary debugger for Windows with a comprehensive plugin system for malware analysis and reverse engineering.

A library for running basic functions from stripped binaries cross platform.

FLARE Obfuscated String Solver (FLOSS) automatically extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.

PINNED