Yara-Unprotect Logo

Yara-Unprotect

0
Free
Visit Website

This repository regroups the Yara Rules created for the Unprotect Project and for detecting the malware evasion techniques. Some rules are comming from https://github.com/Yara-Rules/rules/tree/master/Antidebug_AntiVM with an improvement and some modification. This repository provides a collection of Yara rules for detecting malware evasion techniques. The rules are designed to detect various evasion techniques used by malware to avoid detection. This repository is a valuable resource for security researchers and analysts to improve their malware detection capabilities. The rules are regularly updated to ensure they remain effective against the latest malware threats. This repository is a great resource for anyone working in the field of malware analysis and detection.

FEATURES

ALTERNATIVES

Scans running processes for potentially malicious implants and dumps them.

A deserialization payload generator for .NET formatters

A cheat sheet for default credentials to aid in penetration testing and vulnerability assessment

A library for running basic functions from stripped binaries cross platform.

Holistic malware analysis platform with interactive sandbox, static analyzer, and emulation capabilities.

Binwalk is a tool for analyzing, reverse engineering, and extracting firmware images with security and Python 2.7 deprecation notices.

A portable version of XSSHunter.com for finding and exploiting Cross-Site Scripting (XSS) vulnerabilities.

UDcide provides an alternative approach to dealing with Android malware by targeting specific behaviors for removal.

PINNED