h3x2b / yara-rulesView external linksLinks
Yara rules for detecting malware
☆23Sep 9, 2025Updated 5 months ago
Alternatives and similar repositories for yara-rules
Users that are interested in yara-rules are comparing it to the libraries listed below
Sorting:
- Yara rules for quick reverse engineering of malware.☆19Dec 9, 2015Updated 10 years ago
- A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work.☆20Sep 10, 2023Updated 2 years ago
- Malice Yara Plugin☆30Sep 8, 2019Updated 6 years ago
- Collection of YARA signatures from individual research☆45Nov 20, 2023Updated 2 years ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- Yara rules to be used with the Burp Yara-Scanner extension☆49Jan 26, 2022Updated 4 years ago
- This repository regroups the Yara Rules for the Unprotect Project☆26Nov 19, 2020Updated 5 years ago
- My Yara Rules Collection☆53Feb 7, 2016Updated 10 years ago
- YARA rules for use with ProcFilter☆90Jul 28, 2017Updated 8 years ago
- Yara intergrated into BurpSuite☆48Jun 30, 2016Updated 9 years ago
- Repository of yara rules☆60Nov 29, 2022Updated 3 years ago
- Event Log Analysis Tools☆31Sep 27, 2016Updated 9 years ago
- Set of Yara rules for finding files using magics headers☆142Sep 8, 2020Updated 5 years ago
- Yara Ruleset for scanning Linux servers for shells, spamming, phishing and other webserver baddies☆107Mar 4, 2021Updated 4 years ago
- Yara rules for malware families seen as part of targeted threats project☆142Nov 17, 2016Updated 9 years ago
- Some YARA rules i will add from time to time☆66Mar 25, 2023Updated 2 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆37Mar 15, 2023Updated 2 years ago
- File Scanning Framework☆295Sep 15, 2021Updated 4 years ago
- Repository containing IOCs, CSV and MISP JSON from our blogs☆83Aug 4, 2021Updated 4 years ago
- Various Yara signatures (possibly to be included in a release later).☆87May 23, 2019Updated 6 years ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆388May 11, 2022Updated 3 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- Export MISP attributes in Yara☆12Sep 15, 2017Updated 8 years ago
- Parse YARA rules and operate over them more easily.☆195Feb 6, 2025Updated last year
- Command line tool for scanning streams within office documents plus xor db attack☆126Sep 23, 2023Updated 2 years ago
- YARA Rules I come across on the internet☆358Apr 17, 2024Updated last year
- Enables dynamic translation of structured data between formats☆14Dec 14, 2018Updated 7 years ago
- Carbon Black - LastLine Binary Detonation Connector☆11May 22, 2023Updated 2 years ago
- Some rules, scripts of some use to us☆11Oct 25, 2024Updated last year
- Virustotal Data to Timesketch☆16Feb 28, 2019Updated 6 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- Web based code browser using clang to provide basic code analysis.☆46Jul 20, 2017Updated 8 years ago
- Yara rules written by me, for free use.☆20Nov 26, 2021Updated 4 years ago
- ☆66Jan 27, 2023Updated 3 years ago
- Modular command-line threat hunting tool & framework.☆17Jul 20, 2020Updated 5 years ago
- An ICAP Server with yara scanner for URL and content.☆58Dec 19, 2024Updated last year
- A repository of tools and scripts related to malware analysis☆252Jul 29, 2016Updated 9 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 4 years ago