CDI_yara Logo

CDI_yara

0
Free
Visit Website

A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work. This collection of YARA rules is designed to help identify and detect various types of malware and threats. It is intended for use by security professionals and researchers to aid in the detection and analysis of malware and other types of threats.

FEATURES

ALTERNATIVES

A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.

A tool to find XSS vulnerabilities in web applications

A framework for creating XNU based rootkits for OS X and iOS security research

A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence

A Python script for scanning data within an IDB using Yara

A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.

A cutting-edge AI-based IT security platform that identifies malware and cyber-attacks within seconds

A tool for hacking and security testing of JWT