Yara rules written by me, for free use.
☆20Nov 26, 2021Updated 4 years ago
Alternatives and similar repositories for yara-rules
Users that are interested in yara-rules are comparing it to the libraries listed below
Sorting:
- Yara rules for quick reverse engineering of malware.☆19Dec 9, 2015Updated 10 years ago
- Daily updated malware indicator lists from TR-CERT (USOM), including parsed malicious URLs, IPs, and domains.☆15Updated this week
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- A malware scanner with Yara and ClamAV binding☆12Apr 16, 2025Updated 10 months ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Mar 1, 2022Updated 4 years ago
- Welcome to the Pressidium® Yara Rules repository. This section contains a carefully curated collection of Yara rules specifically designe…☆15Nov 5, 2023Updated 2 years ago
- A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work.☆18Sep 10, 2023Updated 2 years ago
- macOS Artifact Intelligence Tool☆13Apr 30, 2019Updated 6 years ago
- Forensic cheatsheets for use with cheat☆15Dec 2, 2021Updated 4 years ago
- Automate Windows Defender STIG to 100% Compliance☆19Jul 26, 2024Updated last year
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆37Mar 15, 2023Updated 2 years ago
- Python3 script which decrypts files encrypted by flawed Cl0p ELF variant.☆17Feb 6, 2023Updated 3 years ago
- A set of commands to bypass Defender (and some other AVs)☆20Jul 25, 2019Updated 6 years ago
- Malicious URLs and IP Addresses compiled by USOM (Computer Emergency Response Team of Turkey), updated once a day.☆21Feb 22, 2026Updated last week
- Collection of Malware Lures