intezer / yara-rules
☆125Updated last month
Alternatives and similar repositories for yara-rules:
Users that are interested in yara-rules are comparing it to the libraries listed below
- Automatic YARA rule generation for Malpedia☆158Updated 2 years ago
- c2 traffic☆189Updated 2 years ago
- Random hunting ordiented yara rules☆95Updated last year
- Repository containing IOCs, CSV and MISP JSON from our blogs☆80Updated 3 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆99Updated 3 weeks ago
- Community modules for CAPE Sandbox☆92Updated this week
- Community modules for FAME☆65Updated last month
- A Yara rule generator for finding related samples and hunting☆158Updated 2 years ago
- ☆98Updated 4 years ago
- Malware similarity platform with modularity in mind.☆78Updated 3 years ago
- Set of Yara rules for finding files using magics headers☆136Updated 4 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆259Updated 6 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- A mapping of used malware names to commonly known family names☆62Updated 2 years ago
- Various capabilities for static malware analysis.☆77Updated 6 months ago
- Collection of rules created using YARA-Signator over Malpedia☆127Updated 4 months ago
- Simple yara rule manager☆66Updated 2 years ago
- Signature engine for all your logs☆166Updated last year
- ☆134Updated 6 years ago
- Generating YARA rules based on binary code☆207Updated 3 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆95Updated last month
- Collection of YARA signatures from individual research☆43Updated last year
- Proofpoint - Emerging Threats - Threat Research tools + publicly shared intel and documentation☆72Updated 3 months ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆100Updated 2 months ago
- Yara rules for malware families seen as part of targeted threats project☆137Updated 8 years ago
- Research indicators and detection rules☆66Updated last year
- Automatically create YARA rules from malicious documents.☆210Updated 2 years ago
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆132Updated 2 years ago
- Definition, description and relationship types of MISP objects☆96Updated this week
- ☆82Updated 5 years ago