VaccinatorSec / yara-rulesLinks
YARA rules for malware detection/classification
☆9Updated 7 months ago
Alternatives and similar repositories for yara-rules
Users that are interested in yara-rules are comparing it to the libraries listed below
Sorting:
- Hatching Triage public command-line utility and API library.☆68Updated last year
- Central Repository for Adding Domains / Links to the Phishing.Database project - https://github.com/mitchellkrogza/Phishing.Database/☆63Updated this week
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆185Updated 2 months ago
- A Python package and command line utility for scanning emails with YARA rules☆20Updated 3 months ago
- Collection of rules created using YARA-Signator over Malpedia☆131Updated 7 months ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆89Updated last week
- Summarize CTI reports with OpenAI☆16Updated this week
- An open source platform to support analysts to organise their case and tasks☆84Updated 2 weeks ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- Cyber Underground General Intelligence Requirements☆93Updated last year
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆73Updated 7 months ago
- ☆143Updated 3 weeks ago
- The undocumented API for reporting sites to Safe Browsing☆11Updated 5 years ago
- Python client for DFIR-IRIS☆20Updated 10 months ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆104Updated last month
- A home for detection content developed by the delivr.to team☆69Updated 3 weeks ago
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆22Updated this week
- Welcome to the SEKOIA.IO Community repository!☆157Updated last week
- ☆92Updated last month
- IOCs published by Black Lotus Labs☆121Updated last month
- Repository of Yara rules dedicated to Phishing Kits Zip files☆225Updated 2 weeks ago
- simple webapp for converting sigma rules into siem queries using the pySigma library☆49Updated last year
- The simplest way to find how to report abusive domains☆56Updated 2 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆34Updated 2 months ago
- ☆130Updated last year
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆59Updated this week
- Indicators of compromise☆12Updated last week
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆114Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆88Updated last week