Huorong Advanced Threat Protection Rules
Introduction Huorong Advanced Threat Protection Rules are written based on MITRE ATT\&CK™ and malware behavioral characteristics. It can detect, block and intercept all kinds of malware, Advan...
Introduction Huorong Advanced Threat Protection Rules are written based on MITRE ATT\&CK™ and malware behavioral characteristics. It can detect, block and intercept all kinds of malware, Advan...
About This project contains the CSV files of malware detection names from some antivirus products, and a PowerShell script for dumping the detection entries. Getting Started Each subfolder con...
Come back later!
Introduction Virus Total Smart Scanner is a tool that can perform file scanning on any given directories. It has basic scan features and implementations, such as file type identification, rule mat...
Intro Huorong Internet Security is known for allowing users to create their own HIPS rules against malware infections, but editing through GUI is not efficient when there are many rules with same ...
Introduction Malware researchers often encounter some AV vendors fail to detect a malware sample, or falsely flags a normal file as being malicious. To build an automatic process of reporting the ...
Introduction Malware usually sniffs the virtual sandbox environment to avoid automated behavior analysis, such as identifying unique files and processes of the virtual machine, or performing opera...