Repository of Yara Rules
☆141Mar 16, 2026Updated last week
Alternatives and similar repositories for Yara-Rules
Users that are interested in Yara-Rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Configuration Extractors for Malware☆125Apr 23, 2025Updated 11 months ago
- ☆78Sep 29, 2025Updated 5 months ago
- ☆21Apr 19, 2024Updated last year
- IDA Python scripts☆42Apr 11, 2025Updated 11 months ago
- Collection of rules created using YARA-Signator over Malpedia☆142Jan 6, 2026Updated 2 months ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- A guide on how to write fast and memory friendly YARA rules☆167Feb 11, 2025Updated last year
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆121Mar 4, 2026Updated 3 weeks ago
- Yara Rules for Modern Malware☆78Mar 3, 2024Updated 2 years ago
- ☆23Jul 7, 2023Updated 2 years ago
- Rules shared by the community from 100 Days of YARA 2024☆89Jan 1, 2025Updated last year
- Collection of YARA signatures from individual research☆44Nov 20, 2023Updated 2 years ago
- Extracted Yara rules from Windows Defender mpavbase and mpasbase☆504Dec 22, 2025Updated 3 months ago
- Detection in the form of Yara, Snort and ClamAV signatures.☆249Nov 1, 2024Updated last year
- IOCs and notes related to malware☆27Jul 7, 2025Updated 8 months ago
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.☆215Updated this week
- God Mode Detection Rules☆132Aug 8, 2024Updated last year
- Living of the Land of Free SaaS☆63Updated this week
- IDA plugin to deobfuscate emotet CFF☆18Apr 26, 2022Updated 3 years ago
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆76Jan 6, 2026Updated 2 months ago
- ReversingLabs YARA Rules☆900Nov 3, 2025Updated 4 months ago
- ☆23Dec 15, 2022Updated 3 years ago
- Maintained by the ANY.RUN team, this repository provides YARA rules to help detect and classify various malware families and other malici…☆26Nov 1, 2025Updated 4 months ago
- ☆66Jan 27, 2023Updated 3 years ago
- Repository of YARA rules made by Trellix ATR Team☆627Mar 18, 2025Updated last year
- ☆11Jun 12, 2023Updated 2 years ago
- ☆27Nov 26, 2024Updated last year
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆416Nov 8, 2025Updated 4 months ago
- Elastic Security detection content for Endpoint☆1,389Mar 16, 2026Updated last week
- A collection of various SIEM rules relating to malware family groups.☆69Jun 18, 2024Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023☆78Apr 12, 2023Updated 2 years ago
- A C# based tool for analysing malicious OneNote documents☆117Apr 4, 2023Updated 2 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆58Sep 15, 2025Updated 6 months ago
- QRadar AQL backend for converting Sigma rules to QRadar AQL queries☆14Sep 18, 2025Updated 6 months ago
- yaa - yaml search for humans☆12Dec 8, 2025Updated 3 months ago
- ☆31Feb 28, 2025Updated last year
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Dec 26, 2023Updated 2 years ago
- A collection of curated YARA rules used as part of the Filescan.io service☆22Feb 18, 2026Updated last month
- yara detection rules for hunting with the threathunting-keywords project☆157May 11, 2025Updated 10 months ago