Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
-
Updated
May 19, 2024 - YARA
Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
All-in-One malware analysis tool.
🐺 Malware analysis platform
detect malicious program behaviors
An open source script to perform malware static analysis on Portable Executable
Extracted Yara rules from Windows Defender mpavbase and mpasbase
A Malware classifier dataset built with header fields’ values of Portable Executable files
Notes and IoCs of fresh malware
This tool maps a file's behavior on MITRE ATT&CK matrix.
Analysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules
Yara Dockerfile
Collection of YARA signatures from individual research
Malice Yara Plugin
Public repository containing materials for various malware-related streams.
Resources from Trend Micro Research teams
Audit Node Module folder with YARA rules to identify possible malicious packages hiding in node_moudles
Yara rules written by me, for free use.
This repository contains dynamic and static tools for IoT malware analysis
Add a description, image, and links to the malware-analysis topic page so that developers can more easily learn about it.
To associate your repository with the malware-analysis topic, visit your repo's landing page and select "manage topics."