ditekshen / detectionLinks
Detection in the form of Yara, Snort and ClamAV signatures.
☆229Updated 8 months ago
Alternatives and similar repositories for detection
Users that are interested in detection are comparing it to the libraries listed below
Sorting:
- Collection of rules created using YARA-Signator over Malpedia☆131Updated 8 months ago
- Collection of private Yara rules.☆358Updated 2 months ago
- Automated YARA Rule Standardization and Quality Assurance Tool☆228Updated last week
- Community modules for CAPE Sandbox☆101Updated last week
- A guide on how to write fast and memory friendly YARA rules☆145Updated 5 months ago
- ☆136Updated 2 weeks ago
- Signatures and IoCs from public Volexity blog posts.☆355Updated last month
- Elastic Security Labs releases☆75Updated last week
- ☆130Updated last year
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆104Updated 2 months ago
- ☆69Updated 4 months ago
- JPCERT/CC public YARA rules repository☆110Updated 7 months ago
- ☆206Updated last month
- File analysis and management framework.☆88Updated last year
- Sysmon EDR POC Build within Powershell to prove ability.☆225Updated 4 years ago
- Automatic YARA rule generation for Malpedia☆161Updated 2 years ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆377Updated 3 years ago
- Anything Sysmon related from the MSTIC R&D team☆153Updated last year
- Python scripts for Malware Bazaar☆154Updated last year
- Welcome to the SEKOIA.IO Community repository!☆161Updated 2 weeks ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆139Updated last year
- Sigma rules from Joe Security☆217Updated 8 months ago
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.☆185Updated last week
- ☆127Updated 5 months ago
- Live forensic artifacts collector☆168Updated last year
- Security ML models encoded as Yara rules☆214Updated 2 years ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆250Updated 2 years ago
- Distributed malware processing framework based on Python, Redis and S3.☆431Updated 2 weeks ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆607Updated 3 weeks ago
- Hatching Triage public command-line utility and API library.☆68Updated last year