ditekshen / detectionLinks
Detection in the form of Yara, Snort and ClamAV signatures.
☆245Updated last year
Alternatives and similar repositories for detection
Users that are interested in detection are comparing it to the libraries listed below
Sorting:
- Collection of private Yara rules.☆375Updated 3 weeks ago
- Collection of rules created using YARA-Signator over Malpedia☆142Updated last year
- ☆150Updated 2 months ago
- A guide on how to write fast and memory friendly YARA rules☆162Updated 10 months ago
- Automated YARA Rule Standardization and Quality Assurance Tool☆265Updated last week
- Community modules for CAPE Sandbox☆108Updated last week
- ☆131Updated last year
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.☆211Updated 2 weeks ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆114Updated last week
- Repository of YARA rules made by Trellix ATR Team☆624Updated 9 months ago
- Welcome to the SEKOIA.IO Community repository!☆173Updated last week
- Signatures and IoCs from public Volexity blog posts.☆361Updated last month
- Encyclopedia for Executables☆465Updated 4 years ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆387Updated 3 years ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆663Updated last week
- Elastic Security Labs releases☆81Updated last month
- ☆212Updated 7 months ago
- ☆78Updated 3 months ago
- Sigma rules from Joe Security☆229Updated last year
- YARA rule analyzer to improve rule quality and performance☆108Updated 8 months ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆257Updated 3 years ago
- Threat Intel IoCs + bits and pieces of dark matter☆427Updated 3 weeks ago
- File analysis and management framework.☆92Updated 2 years ago
- Security ML models encoded as Yara rules☆216Updated 2 years ago
- Anything Sysmon related from the MSTIC R&D team☆155Updated last year
- The Sigma command line interface based on pySigma☆169Updated last month
- Live forensic artifacts collector☆172Updated last year
- YARA Rules I come across on the internet☆358Updated last year
- Automatic YARA rule generation for Malpedia☆165Updated 3 years ago
- Malware Sandboxes & Malware Source☆106Updated 8 years ago