Detection Engineering with YARA
☆87Jan 6, 2024Updated 2 years ago
Alternatives and similar repositories for YARA_Detection_Engineering
Users that are interested in YARA_Detection_Engineering are comparing it to the libraries listed below
Sorting:
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Nov 13, 2022Updated 3 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆25May 29, 2023Updated 2 years ago
- Cover various security approaches to attack techniques and also provides new discoveries about security breaches.☆486Apr 17, 2025Updated 10 months ago
- Rules shared by the community from 100 Days of YARA 2024☆89Jan 1, 2025Updated last year
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- Yara Rules for Modern Malware☆78Mar 3, 2024Updated 2 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆86Dec 17, 2025Updated 2 months ago
- ☆23Mar 17, 2024Updated last year
- ☆78Sep 29, 2025Updated 5 months ago
- VSCode extension for the YARA pattern matching language☆63Jan 10, 2024Updated 2 years ago
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆74Apr 18, 2024Updated last year
- YARA Language Server☆74Feb 3, 2026Updated 3 weeks ago
- Sandbox feature upgrade with the help of wrapped samples☆76Jun 23, 2018Updated 7 years ago
- Ghosting-AMSI☆18Apr 30, 2025Updated 10 months ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 4 years ago
- ☆18Feb 2, 2026Updated last month
- This is a collection of threat detection rules / rules engines that I have come across.☆296May 5, 2024Updated last year
- Alternative YARA scanning engine☆73Aug 23, 2022Updated 3 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆37Jan 2, 2024Updated 2 years ago
- ☆22May 24, 2024Updated last year
- God Mode Detection Rules☆133Aug 8, 2024Updated last year
- A list of RMMs designed to be used in automation to build alerts☆117Nov 9, 2025Updated 3 months ago
- Hunting Queries for Defender ATP☆83Dec 14, 2025Updated 2 months ago
- ☆84Nov 21, 2024Updated last year
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Jan 18, 2023Updated 3 years ago
- Resources To Learn And Understand SIGMA Rules☆183Feb 14, 2023Updated 3 years ago
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- Scripts and lists to help generate YARA friendly string mutations☆22Apr 9, 2023Updated 2 years ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆258Nov 24, 2023Updated 2 years ago
- Sysmon configuration file template with default high-quality event tracing☆576Jan 21, 2026Updated last month
- Defanged Indicator of Compromise (IOC) Extractor.☆567Aug 28, 2024Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Apr 27, 2024Updated last year
- A guide on how to write fast and memory friendly YARA rules☆166Feb 11, 2025Updated last year
- UnpacMe IDA Byte Search☆29Nov 20, 2023Updated 2 years ago
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10May 3, 2019Updated 6 years ago