intezer / yara-rules
☆125Updated last month
Alternatives and similar repositories for yara-rules:
Users that are interested in yara-rules are comparing it to the libraries listed below
- Automatic YARA rule generation for Malpedia☆158Updated 2 years ago
- c2 traffic☆189Updated 2 years ago
- Random hunting ordiented yara rules☆95Updated last year
- Repository containing IOCs, CSV and MISP JSON from our blogs☆80Updated 3 years ago
- A mapping of used malware names to commonly known family names☆62Updated 2 years ago
- Set of Yara rules for finding files using magics headers☆136Updated 4 years ago
- Simple yara rule manager☆66Updated 2 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆95Updated 2 weeks ago
- A Yara rule generator for finding related samples and hunting☆158Updated 2 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆100Updated 2 weeks ago
- ☆82Updated 5 years ago
- Malware similarity platform with modularity in mind.☆78Updated 3 years ago
- YARA rules for use with ProcFilter☆85Updated 7 years ago
- ☆97Updated 4 years ago
- Community modules for FAME☆65Updated last month
- Community modules for CAPE Sandbox☆91Updated this week
- Hatching Triage public command-line utility and API library.☆66Updated last year
- PE Import Hash Generator☆75Updated 7 years ago
- Miscellaneous Malware RE☆195Updated 2 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆106Updated 7 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- Ursnif beacon decryptor☆27Updated last year
- Personal compilation of APT malware from whitepaper releases, documents and own research☆259Updated 6 years ago
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆132Updated 2 years ago
- Automatically create YARA rules from malicious documents.☆210Updated 2 years ago
- Research indicators and detection rules☆66Updated last year
- My Yara Rules Collection☆52Updated 9 years ago
- Yara rules for malware families seen as part of targeted threats project☆135Updated 8 years ago
- Django web interface for managing Yara rules☆190Updated 6 years ago
- Lazy Office Analyzer☆119Updated 8 years ago