h3x2b / yara-rules
Yara rules for detecting malware
☆23Updated 4 months ago
Alternatives and similar repositories for yara-rules:
Users that are interested in yara-rules are comparing it to the libraries listed below
- Yara rules for quick reverse engineering of malware.☆19Updated 9 years ago
- This repository regroups the Yara Rules for the Unprotect Project☆24Updated 4 years ago
- Malice Yara Plugin☆30Updated 5 years ago
- Yara rules to be used with the Burp Yara-Scanner extension☆45Updated 2 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- Event Log Analysis Tools☆29Updated 8 years ago
- Validates yara rules and tries to repair the broken ones.☆39Updated 4 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆37Updated last year
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆41Updated 6 years ago
- A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work.☆19Updated last year
- Some rules, scripts of some use to us☆9Updated 2 months ago
- A collection of my public YARA signatures for various malware families☆29Updated 3 months ago
- Command-line Interface for Binar.ly☆37Updated 8 years ago
- Process HTTP Pcaps With YARA☆101Updated 11 years ago
- Plugins for the Viper Framework☆14Updated 5 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Updated 7 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 6 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Updated 6 years ago
- Generate bulk YARA rules from YAML input☆22Updated 4 years ago
- Handy scripts to speed up malware analysis☆35Updated last year
- Python OpenIOC Editor☆18Updated 9 years ago
- An ICAP Server with yara scanner for URL and content.☆58Updated 3 weeks ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆36Updated 8 years ago
- Collection of YARA signatures from individual research☆42Updated last year
- Performs OCR on image files and scans them for matches to YARA rules☆40Updated 6 years ago
- Open Development projects for TekDefense☆77Updated 8 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Endpoint monitoring stack.☆18Updated 9 years ago