☆23Dec 15, 2022Updated 3 years ago
Alternatives and similar repositories for 2022
Users that are interested in 2022 are comparing it to the libraries listed below
Sorting:
- Rules Shared by the Community from 100 Days of YARA 2023☆78Apr 12, 2023Updated 2 years ago
- Rules shared by the community from 100 Days of YARA 2024☆89Jan 1, 2025Updated last year
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- ☆19Oct 23, 2020Updated 5 years ago
- Scripts to help and speed up reversing activities☆13Jan 12, 2026Updated last month
- ☆27Mar 2, 2022Updated 3 years ago
- Historical Observations of Actionable Reputation Data☆13Jun 26, 2018Updated 7 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- ☆128Feb 2, 2025Updated last year
- A specification and style guide for YARA rules☆68Feb 17, 2024Updated 2 years ago
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- Random hunting ordiented yara rules☆96Mar 27, 2023Updated 2 years ago
- It's like DocBleach, but in your browser☆18Oct 24, 2019Updated 6 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆26Dec 13, 2022Updated 3 years ago
- Adversary Simulation Framework☆38Aug 19, 2025Updated 6 months ago
- ☆23Feb 3, 2021Updated 5 years ago
- Visualize Microsoft Defender XDR process trees and security events☆33Aug 24, 2025Updated 6 months ago
- DocBleachShell is the integration of the great DocBleach, https://github.com/docbleach/DocBleach Content Disarm and Reconstruction tool i…☆21Jan 15, 2022Updated 4 years ago
- Collection of my own detection rules☆20Jan 6, 2026Updated last month
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆24Mar 24, 2025Updated 11 months ago
- Basic tutorials for reverse engineer with radare2☆60Mar 17, 2019Updated 6 years ago
- API functions for Malware Research☆35Jul 9, 2019Updated 6 years ago
- gundog - guided hunting in Microsoft Defender☆52Apr 29, 2021Updated 4 years ago
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆72Jan 6, 2026Updated last month
- A collection of typical false positive indicators☆56Dec 5, 2020Updated 5 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Jan 18, 2023Updated 3 years ago
- A guide on how to write fast and memory friendly YARA rules☆166Feb 11, 2025Updated last year
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- Yet Another Memory Analyzer for malware detection and Guarding Operations with YARA and SIGMA☆81Nov 19, 2025Updated 3 months ago
- Repository of YARA rules made by Trellix ATR Team☆625Mar 18, 2025Updated 11 months ago
- A list of IOCs applicable to PoshC2☆24Aug 3, 2020Updated 5 years ago
- Repository of Yara rules created by the Stratosphere team☆29Jul 8, 2021Updated 4 years ago
- Configuration Extractors for Malware☆124Apr 23, 2025Updated 10 months ago
- JPCERT/CC public YARA rules repository☆109Nov 14, 2025Updated 3 months ago
- A collection of empty MSVC projects, compiled using various versions and configurations of Visual Studio.☆33Jun 20, 2024Updated last year
- Sigma Engine implementation in TypeScript☆28Mar 5, 2023Updated 2 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆35Jan 8, 2026Updated last month
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆131Nov 25, 2023Updated 2 years ago