YARA Rules for ProcFilter Logo

YARA Rules for ProcFilter

0
Free
Updated 11 March 2025
Visit Website

The rules in this YARA repository are intended to be compatible with ProcFilter. To use this repository configure ProcFilter's INI file to point to this repository location or copy this repository's contents to ProcFilter's localrules directory. These rules are licensed under the MIT license located here.

FEATURES

SIMILAR TOOLS

Yabin creates Yara signatures from malware to find similar samples.

A detailed analysis of malicious packages and how they work

Explores malware interaction with Windows API and methods for detection and prevention.

A disassembly framework with support for multiple hardware architectures and clean API.

An open-source binary debugger for Windows with a comprehensive plugin system for malware analysis and reverse engineering.

Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32

Search gadgets on binaries to facilitate ROP exploitation.

A tool for processing compiled YARA rules in IDA.

A write-up of the reverse engineering challenge from the 2019 BambooFox CTF competition

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

Copyright © 2025 - All rights reserved