A collection of curated YARA rules used as part of the Filescan.io service
☆22Feb 18, 2026Updated last month
Alternatives and similar repositories for fsYara
Users that are interested in fsYara are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of generic YARA rules☆16Mar 18, 2026Updated last week
- Collection of YARA signatures from individual research☆44Nov 20, 2023Updated 2 years ago
- Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs…☆39Apr 27, 2025Updated 10 months ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆81Mar 10, 2026Updated 2 weeks ago
- ☆18Jan 22, 2026Updated 2 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Muteces (mutexes/mutants) used by various malware families☆23Nov 11, 2024Updated last year
- A collection of YARA signatures that I have found around the web.☆11Apr 29, 2016Updated 9 years ago
- Python CLI covering the FileScan.IO API - enabling automatic interaction with www.filescan.io or private instances☆18Jul 15, 2025Updated 8 months ago
- Artifacts for our RAID 2023 paper, "Xunpack: Cross-Architecture Unpacking for Linux IoT Malware"☆15Oct 12, 2023Updated 2 years ago
- ☆18Mar 26, 2024Updated 2 years ago
- ☆31Feb 28, 2025Updated last year
- ☆23Jul 7, 2023Updated 2 years ago
- yara and radare2, better together☆27Mar 19, 2026Updated last week
- Random hunting ordiented yara rules☆96Mar 27, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ReversingLabs YARA Rules☆900Nov 3, 2025Updated 4 months ago
- YARA rules for use with ProcFilter☆90Jul 28, 2017Updated 8 years ago
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆29Dec 6, 2023Updated 2 years ago
- Carbon Black TAU Excel 4 Macro Analysis☆44Feb 8, 2024Updated 2 years ago
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆27Apr 6, 2020Updated 5 years ago
- Repository of YARA rules made by Trellix ATR Team☆627Mar 18, 2025Updated last year
- ☆24Apr 10, 2024Updated last year
- YARA Language Server☆74Feb 3, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Extracted Yara rules from Windows Defender mpavbase and mpasbase☆504Dec 22, 2025Updated 3 months ago
- because twin clams are better than one clam?☆29Jan 30, 2026Updated last month
- Automated Yara Rule generation using Biclustering☆78Oct 8, 2025Updated 5 months ago
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆388May 11, 2022Updated 3 years ago
- Repository of Yara Rules☆141Mar 16, 2026Updated last week
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆17Sep 9, 2021Updated 4 years ago
- 分析指定应用程序的劫持DLL☆14Sep 18, 2015Updated 10 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 10 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆26Oct 6, 2021Updated 4 years ago
- MCP server plugin for x64dbg debugger - enables AI agents and external tools to control debugging via JSON-RPC 2.0 over HTTP/SSE;Develop …☆40Mar 9, 2026Updated 2 weeks ago
- Do DFIR work in a Windows Sandbox☆21Updated this week
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆12Dec 8, 2020Updated 5 years ago
- LILO based Pulse Secure appliance disk image decryptor☆13Mar 20, 2024Updated 2 years ago
- gosocks is a golang based implementation of a socks5 server which supports custom handlers☆12Mar 10, 2026Updated 2 weeks ago
- ☆11Oct 30, 2024Updated last year