PEpper
An open source script to perform malware static analysis on Portable Executable (by 0x0be)
awesome-yara
A curated list of awesome YARA rules, tools, and people. (by InQuest)
PEpper | awesome-yara | |
---|---|---|
2 | 7 | |
312 | 3,868 | |
0.0% | 1.2% | |
0.0 | 5.5 | |
about 2 years ago | 4 months ago | |
YARA | ||
- | GNU General Public License v3.0 or later |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
PEpper
Posts with mentions or reviews of PEpper.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-05-24.
-
Identifying packers, crypters or protectors
As others have mentioned, looking at entropy is a good metric to generically determine whether or not a given sample is being packed / obfuscated in some way. Doing static analysis on the binary format itself (I'm assuming PE for Windows is the goal) is also useful, such as checking whether or not a section's raw size on disk is much smaller than the virtual size allocated in-memory for that section, which is a reliable indication of packing behavior. This project looks useful for introspecting such behaviors.
- blackeko/PEpper - An open source script to perform malware static analysis on Portable Executable
awesome-yara
Posts with mentions or reviews of awesome-yara.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-06-16.
- XSOAR Yara Feeds
- Incorporating YARA Into Security Processes?
-
Cybersecurity Repositories
YARA
-
YARA Rules for Malware
Check out the myriad of resources available here: https://github.com/InQuest/awesome-yara
-
Identifying packers, crypters or protectors
A signature-based approach with YARA can work to fingerprint the specific software used to obfuscate the malware. A lot of YARA rules for a variety of purposes can be found here, and it might be useful to aggregate ones you care about into your own little detection pipeline.
-
What are the best FOSS YARA rules you would recommend to deploy?
https://github.com/InQuest/awesome-yara#rules
- InQuest/awesome-yara - A curated list of awesome YARA rules, tools, and people.
What are some alternatives?
When comparing PEpper and awesome-yara you can also consider the following projects:
Mobile-Security-Framework-MobSF - Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
audit-node-modules-with-yara - Audit Node Module folder with YARA rules to identify possible malicious packages hiding in node_moudles
Qu1cksc0pe - All-in-One malware analysis tool.
yara - The pattern matching swiss knife
Detect-It-Easy - Program for determining types of files for Windows, Linux and MacOS.
yara-python - The Python interface for YARA