audit-node-modules-with-yara
Audit Node Module folder with YARA rules to identify possible malicious packages hiding in node_moudles (by rpgeeganage)
PEpper
An open source script to perform malware static analysis on Portable Executable (by 0x0be)
audit-node-modules-with-yara | PEpper | |
---|---|---|
4 | 2 | |
20 | 312 | |
- | 0.0% | |
0.0 | 0.0 | |
over 4 years ago | about 2 years ago | |
YARA | YARA | |
- | - |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
audit-node-modules-with-yara
Posts with mentions or reviews of audit-node-modules-with-yara.
We have used some of these posts to build our list of alternatives
and similar projects.
-
Auditing NodeJs modules with YARA rules
To achieve this, I started setting up a small project. It is available at https://github.com/rpgeeganage/audit-node-modules-with-yara
- Node Module supplier chain attack detect using YARA rules
-
Audit Node Module folder with YARA rules
GitHub Repo: https://github.com/rpgeeganage/audit-node-modules-with-yara
PEpper
Posts with mentions or reviews of PEpper.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-05-24.
-
Identifying packers, crypters or protectors
As others have mentioned, looking at entropy is a good metric to generically determine whether or not a given sample is being packed / obfuscated in some way. Doing static analysis on the binary format itself (I'm assuming PE for Windows is the goal) is also useful, such as checking whether or not a section's raw size on disk is much smaller than the virtual size allocated in-memory for that section, which is a reliable indication of packing behavior. This project looks useful for introspecting such behaviors.
- blackeko/PEpper - An open source script to perform malware static analysis on Portable Executable
What are some alternatives?
When comparing audit-node-modules-with-yara and PEpper you can also consider the following projects:
signature-base - YARA signature and IOC database for my scanners and tools
Mobile-Security-Framework-MobSF - Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
solidarity - Solidarity is an environment checker for project dependencies across multiple machines.
Qu1cksc0pe - All-in-One malware analysis tool.
awesome-yara - A curated list of awesome YARA rules, tools, and people.
Detect-It-Easy - Program for determining types of files for Windows, Linux and MacOS.