Detection in the form of Yara, Snort and ClamAV signatures.
☆249Nov 1, 2024Updated last year
Alternatives and similar repositories for detection
Users that are interested in detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of private Yara rules.☆379Jan 28, 2026Updated last month
- Collection of YARA rules designed for usage through VirusTotal.com.☆88Apr 4, 2024Updated last year
- ReversingLabs YARA Rules☆900Nov 3, 2025Updated 4 months ago
- ☆21Apr 19, 2024Updated last year
- Collection of rules created using YARA-Signator over Malpedia☆142Jan 6, 2026Updated 2 months ago
- because twin clams are better than one clam?☆29Jan 30, 2026Updated last month
- Elastic Security detection content for Endpoint☆1,389Mar 16, 2026Updated last week
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- Alternative YARA scanning engine☆73Aug 23, 2022Updated 3 years ago
- yara detection rules for hunting with the threathunting-keywords project☆157May 11, 2025Updated 10 months ago
- Repository with selected IOCs and YARA rules for threat hunting.☆35May 21, 2025Updated 10 months ago
- YARA signature and IOC database for my scanners and tools☆2,884Mar 9, 2026Updated 2 weeks ago
- Repository of Yara Rules☆141Mar 16, 2026Updated last week
- Repository of YARA rules made by Trellix ATR Team☆627Mar 18, 2025Updated last year
- A guide on how to write fast and memory friendly YARA rules☆167Feb 11, 2025Updated last year
- Indicators of Compromises (IOC) of our various investigations☆1,934Updated this week
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- ☆553Dec 4, 2023Updated 2 years ago
- A curated list of awesome YARA rules, tools, and people.☆4,163Mar 16, 2026Updated last week
- ☆130Feb 2, 2025Updated last year
- Malware Configuration And Payload Extraction☆3,082Updated this week
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆416Nov 8, 2025Updated 4 months ago
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- Automatic YARA rule generation for Malpedia☆168Sep 8, 2022Updated 3 years ago
- Dynamic unpacker based on PE-sieve☆799Sep 13, 2025Updated 6 months ago
- Security ML models encoded as Yara rules☆215Jul 6, 2023Updated 2 years ago
- yarGen is a generator for YARA rules☆1,781Jan 10, 2026Updated 2 months ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆121Mar 4, 2026Updated 2 weeks ago
- Automated YARA Rule Standardization and Quality Assurance Tool☆294Updated this week
- ☆18Mar 26, 2024Updated last year
- Automatically created C2 Feeds☆667Updated this week
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆388May 11, 2022Updated 3 years ago
- c2 traffic☆194Feb 6, 2023Updated 3 years ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆648Aug 4, 2025Updated 7 months ago
- ☆18Jul 27, 2017Updated 8 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago
- YARA Rules I come across on the internet☆359Apr 17, 2024Updated last year
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago