anyrun / YARALinks
Maintained by the ANY.RUN team, this repository provides YARA rules to help detect and classify various malware families and other malicious artifacts.
☆26Updated 3 months ago
Alternatives and similar repositories for YARA
Users that are interested in YARA are comparing it to the libraries listed below
Sorting:
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated 2 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 7 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆55Updated last year
- A YARA & Malware Analysis Toolkit written in Rust.☆92Updated this week
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆86Updated last month
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- Yara Rules for Modern Malware☆78Updated last year
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆51Updated 9 months ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆76Updated last month
- BlackBerry Threat Research & Intelligence☆100Updated 2 years ago
- Rules shared by the community from 100 Days of YARA 2025☆38Updated last month
- C2 Active Scanner☆59Updated last year
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆108Updated last year
- A home for detection content developed by the delivr.to team☆73Updated 5 months ago
- A MITRE ATT&CK Lookup Tool☆46Updated last year
- The backend server handling API requests and task management☆55Updated this week
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated last month
- Turn any blog into structured threat intelligence.☆51Updated this week
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- A simple script to read the contents of a zip/tar/folder and extract metadata☆21Updated 4 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆58Updated 11 months ago
- God Mode Detection Rules☆135Updated last year
- ☆52Updated 5 months ago
- A GUI to query the API of abuse.ch.☆70Updated 3 years ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆82Updated 8 months ago
- Detection rule validation☆40Updated 2 years ago
- This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆34Updated 3 years ago
- Quick ESXi Log Parser☆28Updated 3 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆17Updated 2 years ago