godaddy / yara-rulesLinks
YARA rules for use with ProcFilter
☆87Updated 8 years ago
Alternatives and similar repositories for yara-rules
Users that are interested in yara-rules are comparing it to the libraries listed below
Sorting:
- PE Import Hash Generator☆79Updated 8 years ago
- BinSequencer is a script designed to find a common pattern of bytes within a set of samples and generate a YARA rule from the identified…☆78Updated 3 years ago
- Various Yara signatures (possibly to be included in a release later).☆87Updated 6 years ago
- A Yara rule generator for finding related samples and hunting☆159Updated 3 years ago
- Handy scripts to speed up malware analysis☆35Updated 2 years ago
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆141Updated 3 years ago
- Automatic YARA rule generation for Malpedia☆162Updated 3 years ago
- Lazy Office Analyzer☆122Updated 8 years ago
- A taxonomy and dictionary of malware behaviors.☆43Updated 6 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆37Updated 2 years ago
- My Yara Rules Collection☆53Updated 9 years ago
- ☆82Updated 9 years ago
- ☆97Updated 5 years ago
- Ursnif beacon decryptor☆27Updated 2 years ago
- ☆84Updated 5 years ago
- Telsy CTI Research Team☆57Updated 4 years ago
- Repository containing IOCs, CSV and MISP JSON from our blogs☆81Updated 4 years ago
- Random hunting ordiented yara rules☆97Updated 2 years ago
- Parse Windows Prefetch files: Supports XP - Windows 10 Prefetch files☆120Updated last year
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 7 years ago
- Parse YARA rules and operate over them more easily.☆192Updated 8 months ago
- VSCode extension for the YARA pattern matching language☆63Updated last year
- Yara rules for quick reverse engineering of malware.☆19Updated 9 years ago
- ☆128Updated 8 months ago
- Repository of yara rules☆60Updated 2 years ago
- Web based Manager for Yara Rules☆58Updated 5 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 7 years ago
- A mapping of used malware names to commonly known family names☆62Updated 2 years ago
- Modified edition of cuckoo community modules☆32Updated 6 years ago
- Various config files obtained during malware analysis☆67Updated 6 years ago