ConventionEngine Logo

ConventionEngine

0
Free
Visit Website

ConventionEngine is a collection of Yara rules looking for PEs with PDB paths that have unique, unusual, or overtly malicious-looking keywords, terms, or other features. For further reading on the context, please see the @FireEye blog series on the subject. Keywords = string words used by malware developers to organize files, folders and code projects, often describing the functionality of the malware. Terms = string words that show up in paths as a result of operating system, software, or user behavior, often indicating that the developer is riding solo or that code project is not being developed for a "enterprise" software product. Anomalies = Other things that are less common but are suspicious or indicative of various behaviors. See also here: https://www.fireeye.com/content/dam/fireeye-www/blog/pdfs/definitive_dossier_pdb_yara_appendix.pdf

FEATURES

ALTERNATIVES

A project providing open-source YARA rules for malware and malicious file detection

Java decompiler for modern Java features up to Java 14.

A native Python cross-version decompiler and fragment decompiler.

A tool to locally check for signs of a rootkit with various checks and tests.

A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.

Find exploits in local and online databases instantly

A command-line utility for examining Objective-C runtime information in Mach-O files and generating class declarations.

Define and validate YARA rule metadata with CCCS YARA Specification.