Links to malware-related YARA rules
☆15Sep 29, 2022Updated 3 years ago
Alternatives and similar repositories for yara-rules
Users that are interested in yara-rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Jun 5, 2019Updated 6 years ago
- Generate Ghidra class structures☆12Jan 3, 2020Updated 6 years ago
- TG 2016 hacking compo repo☆10Mar 31, 2016Updated 10 years ago
- enable libemu run pe file and add some good modify☆14Feb 4, 2019Updated 7 years ago
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Mar 13, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Adversary Simulation Framework☆40Aug 19, 2025Updated 8 months ago
- Helper scripts to automate the extraction of YARA rules from XProtectRemediators☆22Mar 5, 2024Updated 2 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆14Jan 16, 2019Updated 7 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 7 months ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Jan 6, 2021Updated 5 years ago
- A highly available AWS deployment of the Threat Intelligence platform, OpenCTI using Terraform. Native AWS resources are used where feasi…☆39Apr 23, 2023Updated 3 years ago
- ☆13Oct 21, 2022Updated 3 years ago
- ☆14Jun 26, 2020Updated 5 years ago
- VMware Workspace ONE Access and Identity Manager RCE via SSTI - Test script for shodan, file or manual.☆16Feb 13, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- JPCERT/CC public YARA rules repository☆111Mar 9, 2026Updated last month
- Code to Scraping some portion of Data from forum(RaidForums[seized by FBI]) with Python SCRAPY spiders bypassing recaptcha and storing to…☆11Feb 25, 2021Updated 5 years ago
- Cheat Sheets, Metodologies etc.☆19Apr 12, 2019Updated 7 years ago
- Unpacking and decryption tools for the Emotet malware☆44Dec 5, 2021Updated 4 years ago
- ☆23Dec 15, 2022Updated 3 years ago
- Random hunting ordiented yara rules☆96Mar 27, 2023Updated 3 years ago
- Visualize Microsoft Defender XDR process trees and security events☆33Aug 24, 2025Updated 8 months ago
- Power-Forensics is the Best Friend for Incident Responders to perform IR and collect evidences for Linux based host☆12Jun 2, 2023Updated 2 years ago
- List of Awesome Vertex Synapse Resources☆28Aug 6, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Jan 31, 2023Updated 3 years ago
- A MITRE Caldera plugin☆51Updated this week
- A small collection of Burp Suite extensions, written in Python☆10Nov 19, 2016Updated 9 years ago
- Penetration Testing Methodology - short notes☆11May 30, 2015Updated 10 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- IOC Collection 2022☆57Mar 7, 2023Updated 3 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- MBC v2.x expressed in STIX 2.1 JSON☆16Oct 3, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This is a repository that is meant to hold detections for various process injection techniques.☆34Mar 3, 2020Updated 6 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Aug 10, 2022Updated 3 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆30Jun 11, 2020Updated 5 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 11 months ago
- This repository provides tools to fight against Emotet malware. You can protect your system using these tools☆24Jan 24, 2020Updated 6 years ago
- ☆24Apr 10, 2024Updated 2 years ago
- This is the code bundle of Penetration Testing with Raspberry Pi, Second-Edition book☆11Jan 14, 2021Updated 5 years ago