ConventionEngine Logo

ConventionEngine

0
Free
Visit Website

ConventionEngine is a collection of Yara rules looking for PEs with PDB paths that have unique, unusual, or overtly malicious-looking keywords, terms, or other features. For further reading on the context, please see the @FireEye blog series on the subject. Keywords = string words used by malware developers to organize files, folders and code projects, often describing the functionality of the malware. Terms = string words that show up in paths as a result of operating system, software, or user behavior, often indicating that the developer is riding solo or that code project is not being developed for a "enterprise" software product. Anomalies = Other things that are less common but are suspicious or indicative of various behaviors. See also here: https://www.fireeye.com/content/dam/fireeye-www/blog/pdfs/definitive_dossier_pdb_yara_appendix.pdf

FEATURES

ALTERNATIVES

A curated list of open-source projects containing protestware sourced from various platforms.

A tool for malware analysts to search through base64-encoded samples and generate yara rules.

ICSREF is a modular framework for automated reverse engineering of industrial control systems binaries

Binwalk is a tool for analyzing, reverse engineering, and extracting firmware images with security and Python 2.7 deprecation notices.

A suite of secret scanners built in Rust for performance.

Automated Android Malware Analysis tool

A static analysis tool for PE files that detects malicious behavior and provides information for manual analysis.

A tool for signature analysis of RTF files to detect potentially unique parts and malicious documents.

PINNED