RussianPanda95 / Yara-Rules
Repository of Yara Rules
☆88Updated last month
Related projects ⓘ
Alternatives and complementary repositories for Yara-Rules
- A ProcessMonitor visualization application written in rust.☆176Updated last year
- A C# based tool for analysing malicious OneNote documents☆107Updated last year
- A specification and style guide for YARA rules☆37Updated 9 months ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- A collection of tools, scripts and personal research☆113Updated 4 months ago
- ☆76Updated 6 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆72Updated 2 months ago
- Configuration Extractors for Malware☆54Updated last month
- Rules shared by the community from 100 Days of YARA 2024☆78Updated 7 months ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆65Updated last year
- Yara Rules for Modern Malware☆67Updated 8 months ago
- ☆36Updated 7 months ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆146Updated this week
- ☆111Updated last week
- ☆173Updated 3 months ago
- Powershell Linter☆46Updated last month
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆125Updated 4 months ago
- A collection of tools and detections for the Sliver C2 Frameworj☆109Updated last year
- Elastic Security Labs releases☆52Updated 3 weeks ago
- ☆64Updated last year
- Active C&C Detector☆150Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated last year
- ☆105Updated 9 months ago
- Default Detections for EDR☆94Updated 9 months ago
- Some of my Malware Analysis writeups.☆42Updated last year
- ☆153Updated 6 months ago
- YARA rule analyzer to improve rule quality and performance☆93Updated 11 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆123Updated 5 months ago
- The Windows Malware Analysis Reversing Core Tools☆89Updated 3 years ago