File Scanning Framework (FSF) v1.1 Logo

File Scanning Framework (FSF) v1.1

0
Free
Visit Website

What is the 'file scanning framework'? Network defenders should be empowered to drive capabilities forward how they see fit. This is the philosophy upon which, FSF was designed. FSF is a modular, recursive file scanning solution. FSF enables analysts to extend the utility of the Yara signatures they write and define actionable intelligence within a file. This is accomplished by recursively scanning a file and looking for opportunities to extract file objects using a combination of Yara signatures (to define opportunities) and programmable logic (to define what to do with the opportunity). The framework allows you to build out your intelligence capability by empowering you to apply observations wrought out of the analytical process… Okay that’s a mouthful – but think about it – if you see that some pattern (maybe a string or a byte sequence) that represents some concept or behavior; through the use of the framework, you are positioned to capture that observation and apply it to certain file types that meet your criteria. The goal being, to help extend the utility for observations from malware analysis and reverse engineering efforts.

FEATURES

ALTERNATIVES

A program to manage yara ruleset in a database with support for different databases and configuration options.

Exploiting a vulnerability in HID iClass system to retrieve master authentication key for cloning cards and changing reader settings.

A tool that generates pseudo-malicious files to trigger YARA rules.

A collection of Android Fakebank and Tizi samples for analyzing spyware on Android devices.

Generate Yara rules from function basic blocks in x64dbg.

A project providing open-source YARA rules for malware and malicious file detection

Detect capabilities in executable files and identify potential behaviors.

Tool for decompressing malware samples to run Yara rules against them.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved