Repository that contains a set of purposefully erroneous Yara rules.
☆61Jul 23, 2025Updated 7 months ago
Alternatives and similar repositories for FARA
Users that are interested in FARA are comparing it to the libraries listed below
Sorting:
- Identifies metadata of .NET binary files.☆21Apr 3, 2024Updated last year
- SQL, IIS, Oh My...☆22Feb 24, 2025Updated last year
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- YARA Language Server☆74Feb 3, 2026Updated last month
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- This is a collection of threat detection rules / rules engines that I have come across.☆297May 5, 2024Updated last year
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated 2 months ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- ☆107Dec 9, 2025Updated 3 months ago
- Exit if environment variables known to be used as access tokens are set.☆15May 30, 2022Updated 3 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 8 months ago
- A tool to help malware analysts signature unique parts of RTF documents☆28Jan 5, 2026Updated 2 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Dec 5, 2023Updated 2 years ago
- YARI is an interactive debugger for YARA Language.☆90Sep 10, 2025Updated 6 months ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Apr 12, 2023Updated 2 years ago
- Awesome VirusTotal Intelligence Search Queries☆333May 16, 2023Updated 2 years ago
- Tools for Incident Response and Malware Analysis☆11Feb 9, 2025Updated last year
- Repository with supporting materials for Invictus Academy/Training☆44Jan 3, 2025Updated last year
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- ☆21Apr 19, 2024Updated last year
- ☆60May 25, 2023Updated 2 years ago
- Retrieve inner payloads from Donut samples☆123Mar 12, 2026Updated last week
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Aug 16, 2024Updated last year
- ☆10Sep 11, 2021Updated 4 years ago
- A rootkit for linux kernel >= 3.0☆19May 18, 2014Updated 11 years ago
- Shows which M365 Objects have Privileged Access and what type (i.e. PIM, Direct, Currently Elevated)☆38May 17, 2025Updated 10 months ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆92Aug 30, 2024Updated last year
- Kubernetes audit logging, when you don't control the control plane☆91Updated this week
- ☆56Dec 13, 2025Updated 3 months ago
- Splunk integration with MISP☆12Apr 14, 2018Updated 7 years ago
- string encryption in Nim☆19Jun 15, 2024Updated last year
- Yara filetype plugin for Vim.☆14Feb 18, 2021Updated 5 years ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Nov 19, 2024Updated last year
- C2 Active Scanner☆59Jun 19, 2024Updated last year
- Simplified version of a common crawl fetcher☆17Dec 24, 2025Updated 2 months ago