A script to collect (the most famous) Yara rules from more than 150 free resources. Free alternative to: https://valhalla.nextron-systems.com/
☆28Aug 26, 2023Updated 2 years ago
Alternatives and similar repositories for Yara-Repo
Users that are interested in Yara-Repo are comparing it to the libraries listed below
Sorting:
- DFIRLab / Plateforme d'investigation numérique☆15Jul 6, 2021Updated 4 years ago
- Tool to rip system and user data from OSX and macOS☆16Dec 6, 2022Updated 3 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 4 years ago
- ☆18Jan 18, 2022Updated 4 years ago
- Modular command-line threat hunting tool & framework.☆17Jul 20, 2020Updated 5 years ago
- A tool to use novel locations to extract metadata from Office documents.☆64Jun 20, 2023Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Dec 9, 2017Updated 8 years ago
- ☆25Jul 23, 2024Updated last year
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- TAPIR is a multi-user, client/server, incident response framework☆47Jul 7, 2022Updated 3 years ago
- Learn about a network from a pcap file or reading from an interface☆29Apr 6, 2024Updated last year
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆116Feb 8, 2026Updated 3 weeks ago
- Generate YARA rules for OOXML documents.☆38Jun 1, 2023Updated 2 years ago
- intrusion detection☆26Jun 14, 2017Updated 8 years ago
- A triage data collection script for macOS☆29Nov 27, 2020Updated 5 years ago
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆35Feb 2, 2022Updated 4 years ago
- Collection of walkthroughs on various threat hunting techniques☆76Aug 3, 2020Updated 5 years ago
- ☆36Jan 11, 2023Updated 3 years ago
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆135Jul 25, 2019Updated 6 years ago
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆32Mar 9, 2022Updated 3 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- An application that displays a map and graphs showing solar irradiance forecasts in solar farms in Georgia using data from the National S…☆10Oct 15, 2021Updated 4 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- List of sources for cybersecurity news☆41Dec 16, 2022Updated 3 years ago
- Resources To Learn And Understand SIGMA Rules☆183Feb 14, 2023Updated 3 years ago
- Blueteam operational triage registry hunting/forensic tool.☆149Sep 2, 2025Updated 6 months ago
- This repository contains Splunk queries to hunt some anomalies☆46Jul 28, 2022Updated 3 years ago
- ReWrite of AChoir in Go for Cross Platform forensic artifact collection and processing☆41Updated this week
- Utility for parsing Bro log files into CSV or JSON format☆41Jan 12, 2023Updated 3 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆150Feb 1, 2026Updated last month
- Indian agricultural analysis☆11Nov 20, 2018Updated 7 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- Script to output Azure IAM permissions and flag any explicit/owner permissions for review☆10May 18, 2020Updated 5 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- Automated CIS Benchmark Compliance Remediation for Apache 2.4 with Ansible☆11Oct 7, 2022Updated 3 years ago