Halogen Logo

Halogen

0
Free
Updated 11 March 2025
Visit Website

Halogen is a tool to automate the creation of yara rules based on the image files embedded within a malicious document. This can assist cyber security professionals in writing detection rules for malicious threats as well as help responders in identifying with particular threat they are dealing with. Currently, Halogen is able to create rules based on JPG and PNG files. Usage: halogen.py [-h] [-f FILE] [-d DIR] [-n NAME] [--png-idat] [--jpg-sos] [--jpg-sof2sos] [--jpg-jump] [-c CONTAINER] [--clam] [--rprefix RPREFIX] Halogen: Automatically create yara rules based on images embedded in office documents. Optional arguments: -h, --help show this help message and exit -f FILE, --file FILE File to parse -d DIR, --directory DIR directory to scan for image files. -n NAME, --rule-name NAME specify a custom name for the rule file --png-idat For PNG matches, instead of starting with the PNG file header, start with the IDAT chunk. --jpg-sos For JPG matches, skip over the header and look for the Start of Scan marker, and begin the match there. --jpg-sof2sos for JPG matches, skip over the header and match the SOF all the way to the SOS + 45 bytes of the data

FEATURES

SIMILAR TOOLS

Sample detection rules and dashboards for Google Security Operations

A threat intelligence and vulnerability monitoring platform that aggregates security alerts from trusted sources and provides customizable monitoring and notification capabilities.

A visualization tool for threat analysis that organizes APT campaign information and visualizes relations of IOC.

Sigma is a generic and open signature format for SIEM systems and other security tools to detect and respond to threats.

The FASTEST Way to Consume Threat Intelligence and make it actionable.

A framework for managing cyber threat intelligence in structured formats.

Stay informed with Rapid7's cybersecurity blog and vulnerability news updates.

Cyber Intelligence Management Platform with threat tracking, forensic artifacts, and YARA rule storage.

Threat hunting tool leveraging Windows events for identifying outliers and suspicious behavior.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved