Rules shared by the community from 100 Days of YARA 2024
☆89Jan 1, 2025Updated last year
Alternatives and similar repositories for 2024
Users that are interested in 2024 are comparing it to the libraries listed below
Sorting:
- Rules Shared by the Community from 100 Days of YARA 2023☆78Apr 12, 2023Updated 2 years ago
- ☆23Dec 15, 2022Updated 3 years ago
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated 2 months ago
- A guide on how to write fast and memory friendly YARA rules☆167Feb 11, 2025Updated last year
- Repository of Yara Rules☆141Updated this week
- A collection of YARA signatures that I have found around the web.☆11Apr 29, 2016Updated 9 years ago
- A specification and style guide for YARA rules☆71Feb 17, 2024Updated 2 years ago
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆16Apr 10, 2024Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆157May 11, 2025Updated 10 months ago
- Collection of my own detection rules☆20Jan 6, 2026Updated 2 months ago
- Muteces (mutexes/mutants) used by various malware families☆23Nov 11, 2024Updated last year
- Configuration Extractors for Malware☆125Apr 23, 2025Updated 10 months ago
- Repository of Yara rules created by the Stratosphere team☆29Jul 8, 2021Updated 4 years ago
- Detection Engineering with YARA☆87Jan 6, 2024Updated 2 years ago
- ReversingLabs YARA Rules☆900Nov 3, 2025Updated 4 months ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- Automated YARA Rule Standardization and Quality Assurance Tool☆294Updated this week
- Knowing which rule should trigger according to the redcannary test☆11Nov 23, 2024Updated last year
- Yara Rules for Modern Malware☆78Mar 3, 2024Updated 2 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Scripts and lists to help generate YARA friendly string mutations☆22Apr 9, 2023Updated 2 years ago
- ☆129Feb 2, 2025Updated last year
- THOR Thunderstorm Collectors☆25Mar 14, 2026Updated last week
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Jun 27, 2023Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆55Dec 5, 2024Updated last year
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- An introduction to detection engineering☆14Jan 3, 2025Updated last year
- ☆22Jan 31, 2023Updated 3 years ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 8 years ago
- The Security Analyst’s Guide to Suricata☆61Apr 28, 2025Updated 10 months ago
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- IDAPython scripts☆15Aug 24, 2017Updated 8 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆132Nov 25, 2023Updated 2 years ago
- ☆27Mar 2, 2022Updated 4 years ago
- ☆19Oct 23, 2020Updated 5 years ago
- CarbonBlack EDR detection rules and response actions☆73Sep 10, 2024Updated last year
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 3 months ago