ConventionEngine Logo

ConventionEngine

0
Free
Visit Website

ConventionEngine is a collection of Yara rules looking for PEs with PDB paths that have unique, unusual, or overtly malicious-looking keywords, terms, or other features. For further reading on the context, please see the @FireEye blog series on the subject. Keywords = string words used by malware developers to organize files, folders and code projects, often describing the functionality of the malware. Terms = string words that show up in paths as a result of operating system, software, or user behavior, often indicating that the developer is riding solo or that code project is not being developed for a "enterprise" software product. Anomalies = Other things that are less common but are suspicious or indicative of various behaviors. See also here: https://www.fireeye.com/content/dam/fireeye-www/blog/pdfs/definitive_dossier_pdb_yara_appendix.pdf

FEATURES

ALTERNATIVES

A tool for identifying and analyzing Java serialized objects in network traffic

Platform for uploading, searching, and downloading malware samples.

A comprehensive guide to malware analysis and reverse engineering, covering topics such as lab setup, debugging, and anti-debugging.

A 32-bit assembler level analyzing debugger for Microsoft Windows.

A tool to detect, manage and exploit Blind Cross-site scripting (XSS) vulnerabilities.

A script to detect and remove Canary Tokens with simple signature-based detections.

Python 3 tool for parsing Yara rules with ongoing development.

A tool that generates Yara rules for strings and their XOR encoded versions, as well as base64-encoded variations with different padding possibilities.

PINNED