malpedia / signator-rules
Collection of rules created using YARA-Signator over Malpedia
☆127Updated 5 months ago
Alternatives and similar repositories for signator-rules:
Users that are interested in signator-rules are comparing it to the libraries listed below
- Automatic YARA rule generation for Malpedia☆159Updated 2 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆102Updated 3 weeks ago
- Community modules for CAPE Sandbox☆95Updated this week
- JPCERT/CC public YARA rules repository☆106Updated 4 months ago
- YARA rule analyzer to improve rule quality and performance☆98Updated last week
- A guide on how to write fast and memory friendly YARA rules☆142Updated 2 months ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆139Updated last year
- Elastic Security Labs releases☆61Updated 2 weeks ago
- ☆68Updated last month
- ☆127Updated 2 weeks ago
- c2 traffic☆188Updated 2 years ago
- Python based CLI for MalwareBazaar☆37Updated 5 months ago
- File analysis and management framework.☆82Updated last year
- Hatching Triage public command-line utility and API library.☆66Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023☆76Updated 2 years ago
- ☆130Updated last year
- ☆125Updated 2 months ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆114Updated last year
- Signature engine for all your logs☆167Updated last year
- Automated YARA Rule Standardization and Quality Assurance Tool☆205Updated last week
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆125Updated 3 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 2 years ago
- Research indicators and detection rules☆66Updated last year
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆59Updated 2 years ago
- Malware Configuration Extraction Modules☆49Updated last year
- Anything Sysmon related from the MSTIC R&D team☆152Updated 10 months ago
- yara detection rules for hunting with the threathunting-keywords project☆116Updated last month
- Visually inspect and force decode YARA and regex matches found in both binary and text data. With Colors.☆119Updated 4 months ago
- ☆199Updated last year
- Detection in the form of Yara, Snort and ClamAV signatures.☆223Updated 5 months ago