A collection of my yara rules
☆34Jul 11, 2023Updated 2 years ago
Alternatives and similar repositories for yara-rules
Users that are interested in yara-rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of small scripts and tools for deobfuscation and malware analysis.☆67Mar 27, 2023Updated 3 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- Indicators of compromise☆17Jan 29, 2026Updated 2 months ago
- Ghosting-AMSI☆18Apr 30, 2025Updated 10 months ago
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆12Jun 6, 2025Updated 9 months ago
- Collection of generic YARA rules☆16Mar 18, 2026Updated last week
- Unpacker and Config Extractor for managed Redline Stealer payloads☆41Feb 18, 2023Updated 3 years ago
- ☆22Mar 4, 2025Updated last year
- A collection of Terraform and Ansible scripts that automatically (and quickly) deploys a small Velociraptor R&D lab.☆22Apr 16, 2021Updated 4 years ago
- Collection of rules created using YARA-Signator over Malpedia☆143Jan 6, 2026Updated 2 months ago
- ☆18Jan 22, 2026Updated 2 months ago
- A PowerShell script to automatically configure for the highest privacy and control settings in Windows 10.☆10Aug 16, 2024Updated last year
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Documentation site for Velociraptor☆70Mar 21, 2026Updated last week
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆78Jan 26, 2026Updated 2 months ago
- Repository with selected IOCs and YARA rules for threat hunting.☆35May 21, 2025Updated 10 months ago
- KoiVM,EazVM,AgileVM Patcher Por "Team Venturi77"☆18Aug 16, 2019Updated 6 years ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 3 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- Yara rules☆22Mar 27, 2023Updated 3 years ago
- Hardening script for Windows (Domain mode or without domain)☆16Sep 18, 2025Updated 6 months ago
- A collaboration effort by the DFIR community to provide definitions (sometimes multiple) for common forensic terms!☆26Dec 1, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Top hashpwn rules☆20Dec 12, 2025Updated 3 months ago
- I have documented all of the AMSI patches that I learned till now☆73Nov 4, 2025Updated 4 months ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- Personal Storage Table implementation in Go/Golang☆37Mar 11, 2026Updated 2 weeks ago
- The Python programming language☆16Nov 22, 2022Updated 3 years ago
- A tool to create randomly insecure file shares that also contain unsecured credential files☆49Feb 16, 2026Updated last month
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- ☆66Sep 1, 2023Updated 2 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Feb 24, 2023Updated 3 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 3 years ago
- A repository to share publicly available Velociraptor detection content☆198Updated this week
- A simple dnSpy extension for easily renaming members.☆20May 27, 2023Updated 2 years ago
- A cyber threat intelligence chatbot that ingested 2200+ reports from vx-underground.☆33Apr 1, 2024Updated last year