ProIntegritate / Yara-rulesLinks
Yara rules for various malware
☆9Updated 3 years ago
Alternatives and similar repositories for Yara-rules
Users that are interested in Yara-rules are comparing it to the libraries listed below
Sorting:
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆38Updated 2 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆30Updated 5 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 4 years ago
- ☆23Updated 4 years ago
- ☆12Updated 4 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- Yara rules written by me, for free use.☆19Updated 3 years ago
- SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.☆28Updated 3 years ago
- ProcDot Malware Sandbox☆24Updated 8 months ago
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visit☆29Updated 3 weeks ago
- This repository regroups the Yara Rules for the Unprotect Project☆26Updated 4 years ago
- ☆47Updated 5 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated last year
- A Maltego transform for VirusTotal Submitter Information☆35Updated 6 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 5 months ago
- Telsy CTI Research Team☆57Updated 4 years ago
- Automated Static Analysis Framework☆9Updated 3 years ago
- Generate YARA rules for OOXML documents.☆38Updated 2 years ago
- This is a repository for the public blog with Labs indicators of compromise and code☆18Updated 5 years ago
- Scans a malware file and lists down the related MBC (Malware Behavior Catalog) details.☆22Updated 3 years ago
- Handy scripts to speed up malware analysis☆35Updated last year
- Collection of YARA signatures from individual research☆44Updated last year
- Community-based integrated malware identification system☆82Updated 2 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆52Updated 6 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Updated 4 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆17Updated 4 years ago
- VirusTotal Intelligence Search☆38Updated 5 years ago
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Updated 3 years ago
- QuasarRAT analysis tools and research report☆27Updated last year
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago