device-flasher
yara
device-flasher | yara | |
---|---|---|
2 | 19 | |
- | 7,656 | |
- | 1.5% | |
- | 8.9 | |
- | 7 days ago | |
C | ||
- | BSD 3-clause "New" or "Revised" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
device-flasher
- Suspiciously high virus detection rate for device-flasher.exe
-
Problem installing CalyxOS on Pixel 4a
From what I gather from the source code of the device flasher, this error is thrown if the file does not contain the word "factory" and is not of file type "zip".
yara
- Ask HN: Regex on a File or Stream
-
Who does check linux distros of malware - open source
Linux has (free) tools to improve security and detect/remove malware: Lynis,Chkrootkit,Rkhunter,ClamAV,Vuls,LMD,radare2,Yara,ntopng,maltrail,Snort,Suricata...
- Release YARA v4.4.0-rc1 - lnk module
- Release YARA v4.3.0-rc1
- yara - The pattern matching swiss knife for malware researchers (and everyone else)
- Hogy lehet észrevenni, ha valaki bejár a gépedre és adatot visz ki? KRÉTA sztori spin-off
- LNK module for Yara
-
Open source tools and standards to lookup known files
Shameless plug: I wrote a small poc module to use hashlookup's bloom filter in yara (https://github.com/VirusTotal/yara). The idea is to easily discard files that are known to be safe and so to avoid launching thousands of yara rules on a file for nothing. One can also use it to keep track of some files that meet certain conditions for instance. The module can store any string in these filters so I see a lot of useful use-cases for this little thingy :)
- Yara - The pattern matching swiss knife
-
Tasked with building a malware analysis / threat hunting machine . Need feedback
YARA - https://virustotal.github.io/yara/
What are some alternatives?
device-flasher - Android Factory Image Flasher for Linux, macOS and Windows
Loki - Loki - Simple IOC and YARA Scanner
malware-ioc - Indicators of Compromises (IOC) of our various investigations
awesome-yara - A curated list of awesome YARA rules, tools, and people.
yarGen - yarGen is a generator for YARA rules
Suricata - Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
flare-floss - FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.
DIE-engine - DIE engine
yara-python - The Python interface for YARA
Log4Shell-Automated - This is an automated script to scan for Log4J vulnerabilities. This is based off of the Datto script.
Microsoft-Activation-Scripts - A collection of scripts for activating Microsoft products using HWID / KMS38 / Online KMS activation methods with a focus on open-source code, less antivirus detection and user-friendliness.