The library is designed to make it easier to check potentially malicious files and archives using YARA and make a decision about their harmfulness based on the weights of the detected rules. Configurable settings include file size limits, processing time limits, and thresholds for determining maliciousness. The library also supports scanning archives and executable files. Using: var log = new S
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A collection of resources for beginners to learn assembly language.
Generates a YARA rule to match basic blocks of the current function in IDA Pro
VolatilityBot automates binary extraction and memory analysis, including detecting code injections and strings.
A detailed analysis of malicious packages and how they work
Tplmap is a tool for detecting and exploiting server-side template injection vulnerabilities.
A wordlist to bruteforce for Local File Inclusion (LFI) vulnerabilities
A tool that scans a corpus of malware and builds a YARA rule to detect similar code sections.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.