filescanio / fsYaraLinks
A collection of curated YARA rules used as part of the Filescan.io service
☆15Updated 2 weeks ago
Alternatives and similar repositories for fsYara
Users that are interested in fsYara are comparing it to the libraries listed below
Sorting:
- JA4TScan is an active TCP server fingerprinting tool.☆84Updated 10 months ago
- C2 Active Scanner☆59Updated last year
- YaraScanner is a file pattern-matching tool based on YARA rules.☆57Updated 2 years ago
- enpoint detection / live analysis & sandbox host / signatures quality test☆44Updated 4 years ago
- The core backend server handling API requests and task management☆43Updated 3 weeks ago
- Alternative YARA scanning engine☆71Updated 2 years ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆67Updated last month
- Collection of rules created using YARA-Signator over Malpedia☆132Updated 8 months ago
- ☆38Updated last week
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated last year
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆30Updated 2 months ago
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆99Updated 6 months ago
- Rules Shared by the Community from 100 Days of YARA 2023☆77Updated 2 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆124Updated 2 months ago
- ☆51Updated 3 weeks ago
- Python based CLI for MalwareBazaar☆37Updated 8 months ago
- A specification and style guide for YARA rules☆50Updated last year
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆83Updated 2 years ago
- Yara Rules for Modern Malware☆77Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syn…☆33Updated 11 months ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Updated 2 years ago
- YARA rule analyzer to improve rule quality and performance☆102Updated 3 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆79Updated 2 months ago
- Maco - Malware config extractor framework☆36Updated this week
- Detection Engineering with YARA☆87Updated last year
- Yara rules☆22Updated 2 years ago
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆45Updated 3 years ago