Repository that contains a set of purposefully erroneous Yara rules.
☆62Jul 23, 2025Updated 7 months ago
Alternatives and similar repositories for FARA
Users that are interested in FARA are comparing it to the libraries listed below
Sorting:
- SQL, IIS, Oh My...☆22Feb 24, 2025Updated last year
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- YARA Language Server☆74Feb 3, 2026Updated 3 weeks ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated last year
- Identifies metadata of .NET binary files.☆21Apr 3, 2024Updated last year
- ☆102Dec 9, 2025Updated 2 months ago
- ☆21Apr 19, 2024Updated last year
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated last month
- This is a collection of threat detection rules / rules engines that I have come across.☆296May 5, 2024Updated last year
- Repository with supporting materials for Invictus Academy/Training☆44Jan 3, 2025Updated last year
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆25May 29, 2023Updated 2 years ago
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 10 months ago
- 🛠️ Explore custom C2 TTPs with Aether-C2-Framework, focusing on lightweight Rust implants and stealthy transport stacks to reduce forens…☆18Updated this week
- Export MISP attributes in Yara☆12Sep 15, 2017Updated 8 years ago
- Five pillars of computational reproducibility☆11Feb 6, 2024Updated 2 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Aug 16, 2024Updated last year
- A tool to help malware analysts signature unique parts of RTF documents☆28Jan 5, 2026Updated last month
- Security tool against dependency typosquatting attacks☆54Updated this week
- ☆60May 25, 2023Updated 2 years ago
- Retrieve inner payloads from Donut samples☆120Dec 1, 2025Updated 3 months ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Dec 24, 2023Updated 2 years ago
- Python client and module for Vulnerability-Lookup.☆14Dec 9, 2025Updated 2 months ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 8 months ago
- Pythonic library of Rewind.ai SQLite Database. Includes CLI and MCP interfaces.☆18Sep 5, 2025Updated 5 months ago
- 🖼 imgify - Convert any file to PNG and back.☆13Oct 20, 2025Updated 4 months ago
- Yara filetype plugin for Vim.☆14Feb 18, 2021Updated 5 years ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Jan 4, 2026Updated last month
- Rules Shared by the Community from 100 Days of YARA 2023☆78Apr 12, 2023Updated 2 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Dec 5, 2023Updated 2 years ago
- ☆52Dec 13, 2025Updated 2 months ago
- Shows which M365 Objects have Privileged Access and what type (i.e. PIM, Direct, Currently Elevated)☆38May 17, 2025Updated 9 months ago
- Automation script to download JSON MISP files from a SFTP server and import them via API to a MISP instance.☆15May 12, 2023Updated 2 years ago
- The autoexpect of pwntools☆18Feb 10, 2019Updated 7 years ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆92Nov 3, 2025Updated 3 months ago
- Virustotal Data to Timesketch☆16Feb 28, 2019Updated 7 years ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Aug 14, 2025Updated 6 months ago