100DaysofYARA / 2023
Rules Shared by the Community from 100 Days of YARA 2023
☆77Updated last year
Alternatives and similar repositories for 2023:
Users that are interested in 2023 are comparing it to the libraries listed below
- YARA rule analyzer to improve rule quality and performance☆97Updated 2 months ago
- Rules shared by the community from 100 Days of YARA 2024☆84Updated 2 months ago
- JPCERT/CC public YARA rules repository☆106Updated 3 months ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆58Updated 2 years ago
- A specification and style guide for YARA rules☆46Updated last year
- Yara Rules for Modern Malware☆73Updated last year
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- Elastic Security Labs releases☆58Updated 4 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆76Updated last year
- A C# based tool for analysing malicious OneNote documents☆111Updated last year
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated 11 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 3 months ago
- Python based CLI for MalwareBazaar☆36Updated 4 months ago
- A guide on how to write fast and memory friendly YARA rules☆141Updated last month
- Active C&C Detector☆152Updated last year
- Detection Engineering with YARA☆87Updated last year
- Reads and prints information from the website MalAPI.io☆19Updated 2 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆138Updated last year
- C2 Active Scanner☆52Updated 8 months ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆94Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆106Updated last week
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆44Updated 2 years ago
- ☆65Updated 2 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆36Updated last year
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆32Updated 3 months ago
- An exercise to practice deobfuscating PowerShell Scripts.☆28Updated 2 years ago
- IOC Collection 2022☆57Updated 2 years ago
- CarbonBlack EDR detection rules and response actions☆71Updated 6 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆118Updated 11 months ago