YARAHQ / yara-forgeLinks
Automated YARA Rule Standardization and Quality Assurance Tool
☆263Updated this week
Alternatives and similar repositories for yara-forge
Users that are interested in yara-forge are comparing it to the libraries listed below
Sorting:
- ☆149Updated 2 months ago
- Rules generated from our investigations.☆203Updated 6 months ago
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.☆211Updated this week
- Signatures and IoCs from public Volexity blog posts.☆361Updated 3 weeks ago
- Welcome to the SEKOIA.IO Community repository!☆171Updated this week
- Sigma rule specification☆161Updated last week
- An opensource sigma conversion tool built using pysigma☆152Updated last week
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆167Updated 3 weeks ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆201Updated last year
- pySigma Elasticsearch backend☆55Updated last week
- A guide on how to write fast and memory friendly YARA rules☆161Updated 10 months ago
- A specification and style guide for YARA rules☆63Updated last year
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (ext4, XFS) journals (not systemd-journald logs), gene…☆98Updated this week
- The Sigma command line interface based on pySigma☆169Updated 3 weeks ago
- LotL RMM☆267Updated 3 weeks ago
- ☆77Updated 2 months ago
- YARA rule analyzer to improve rule quality and performance☆107Updated 8 months ago
- LOKI2 - Simple IOC and YARA Scanner☆109Updated 5 months ago
- A repository of my own Sigma detection rules.☆162Updated last month
- Elastic Security Labs releases☆81Updated last month
- A python script developed to process Windows memory images based on triage type.☆265Updated 2 years ago
- ☆212Updated 6 months ago
- A repository to share publicly available Velociraptor detection content☆191Updated this week
- Sigma rules to share with the community☆123Updated 10 months ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆107Updated last week
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆402Updated last month
- Harness the power of Splunk for your investigations☆145Updated 2 months ago
- Collection of rules created using YARA-Signator over Malpedia☆140Updated last year
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆89Updated last month
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆141Updated last year