DarkenCode / yara-rulesLinks
Repository of yara rules
☆46Updated 10 years ago
Alternatives and similar repositories for yara-rules
Users that are interested in yara-rules are comparing it to the libraries listed below
Sorting:
- Simple web shell scanner written in Golang.☆89Updated 6 years ago
- Malware Sinkhole List in various formats☆102Updated 3 years ago
- Toolset for research malware and Cobalt Strike beacons☆211Updated 9 months ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆267Updated 6 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆108Updated 4 years ago
- Web shell scanner and analyzer.☆113Updated 2 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- Minimal, consistent Python API for building integrations with malware sandboxes.☆140Updated last year
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- Static based decoders for malware samples☆94Updated 5 years ago
- simple YARA-based IOC scanner☆172Updated 3 weeks ago
- Simulating Adversary Operations☆96Updated 7 years ago
- Proofpoint - Emerging Threats - Threat Research tools + publicly shared intel and documentation☆80Updated 3 months ago
- snake - a malware storage zoo☆217Updated 2 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆81Updated 7 years ago
- Explore Indicators of Compromise Automatically☆97Updated 5 years ago
- Tools to interact with APTnotes reporting/index.☆108Updated 5 years ago
- An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal☆204Updated 3 years ago
- ☆53Updated 6 years ago
- A tool for de-obfuscating PowerShell scripts☆71Updated 6 years ago
- Vthunting is a tiny script used to generate report about Virus Total hunting and send it by email, slack or telegram.☆167Updated 2 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆120Updated 6 years ago
- Linux Incident Response☆90Updated 6 years ago
- ☆97Updated 5 years ago
- A repository of open source reports on different malware families used in targeted cyber intrusions ("APT").☆55Updated 10 years ago
- Repository of yara rules☆60Updated 3 years ago
- Endpoint detection & Malware analysis software☆229Updated 6 years ago
- Volatility Plugins☆64Updated 2 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Updated 2 years ago
- PowerShell script for hunting webshells on Microsoft Exchange Servers.☆56Updated 8 years ago