SentineLabs / macos-ttps-yara
A ruleset to find potentially malicious code in macOS malware samples
☆39Updated last year
Alternatives and similar repositories for macos-ttps-yara:
Users that are interested in macos-ttps-yara are comparing it to the libraries listed below
- Repository that contains a set of purposefully erroneous Yara rules.☆51Updated last year
- Rules shared by the community from 100 Days of YARA 2025☆32Updated 3 months ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- pocket guide for core detection engineering concepts☆28Updated last year
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆62Updated this week
- Run Sigma detection rules on logs from the new MacOS EndpointSecurity Framework☆20Updated 4 years ago
- macOS forensic timeline generator using the analysis result DBs of mac_apt☆93Updated last year
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Updated 2 years ago
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆108Updated 7 months ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆74Updated this week
- An index of publicly available and open-source threat detection rulesets.☆43Updated last week
- machofile is a module to parse Mach-O binary files☆51Updated last year
- God Mode Detection Rules☆134Updated 8 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- Detection Engineering with YARA☆87Updated last year
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (EXT4, XFS) journals (not systemd-journald), generates…☆63Updated 3 weeks ago
- ☆87Updated 2 months ago
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.☆17Updated last week
- A home for detection content developed by the delivr.to team☆68Updated 2 months ago
- ☆42Updated last month
- This is a little plugin to copy disassembly in a way that is usable in YARA rules!☆44Updated last week
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆50Updated last month
- Linux #rootkit and #malware revealer☆24Updated 8 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 4 months ago
- Elastic Security Labs releases☆62Updated 3 weeks ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆28Updated 2 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆34Updated 2 weeks ago
- A guide on how to write fast and memory friendly YARA rules☆142Updated 2 months ago
- Mapping XProtect's obfuscated malware family names to common industry names.☆86Updated 11 months ago
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆102Updated last week