DarkenCode / yara-rulesLinks
Repository of yara rules
☆47Updated 10 years ago
Alternatives and similar repositories for yara-rules
Users that are interested in yara-rules are comparing it to the libraries listed below
Sorting:
- Simple web shell scanner written in Golang.☆89Updated 6 years ago
- Malware Sinkhole List in various formats☆104Updated 3 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆266Updated 7 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆108Updated 4 years ago
- Minimal, consistent Python API for building integrations with malware sandboxes.☆142Updated 2 years ago
- Static based decoders for malware samples☆94Updated 5 years ago
- Toolset for research malware and Cobalt Strike beacons☆211Updated 10 months ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- Vthunting is a tiny script used to generate report about Virus Total hunting and send it by email, slack or telegram.☆168Updated 3 years ago
- Web shell scanner and analyzer.☆113Updated 2 years ago
- Yara Ruleset for scanning Linux servers for shells, spamming, phishing and other webserver baddies☆107Updated 4 years ago
- Automated Tactics Techniques & Procedures☆260Updated 2 years ago
- Proofpoint - Emerging Threats - Threat Research tools + publicly shared intel and documentation☆82Updated last week
- Linux Incident Response☆90Updated 6 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- Collection of YARA signatures from individual research☆45Updated 2 years ago
- A tool for detecting VBA stomping.☆101Updated 3 years ago
- A tool for de-obfuscating PowerShell scripts☆71Updated 6 years ago
- ☆53Updated 6 years ago
- Volatility Plugins☆64Updated 2 years ago
- Miscellaneous Malware RE☆195Updated 3 years ago
- PowerShell script for hunting webshells on Microsoft Exchange Servers.☆56Updated 9 years ago
- This repository contains the website and the tools which are part of the joint research between Check Point Research and Intezer to map t…☆111Updated 6 years ago
- Simulating Adversary Operations☆97Updated 7 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆162Updated 10 months ago
- Parse evtx files and detect use of the DanderSpritz eventlogedit module☆151Updated 8 years ago
- Collection of various files from infected hosts☆76Updated 3 years ago
- simple YARA-based IOC scanner☆175Updated 3 weeks ago
- Telsy CTI Research Team☆57Updated 5 years ago
- Repository containing IOCs, CSV and MISP JSON from our blogs☆83Updated 4 years ago