Yara rules
☆22Mar 27, 2023Updated 2 years ago
Alternatives and similar repositories for yara_rules
Users that are interested in yara_rules are comparing it to the libraries listed below
Sorting:
- ☆23Mar 17, 2024Updated last year
- ☆22Dec 22, 2020Updated 5 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- Just Another broken Registry Parser (JARP)☆16May 23, 2024Updated last year
- macOS Artifact Intelligence Tool☆13Apr 30, 2019Updated 6 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- ☆21Apr 19, 2024Updated last year
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Jan 18, 2023Updated 3 years ago
- YARI is an interactive debugger for YARA Language.☆90Sep 10, 2025Updated 5 months ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- This is a set of tools for doing forensics analysis on Microsoft ESE databases.☆130Jan 31, 2022Updated 4 years ago
- ☆11Apr 25, 2021Updated 4 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Feb 15, 2022Updated 4 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- ☆23Jun 1, 2023Updated 2 years ago
- Random hunting ordiented yara rules☆96Mar 27, 2023Updated 2 years ago
- Collection of rules created using YARA-Signator over Malpedia☆141Jan 6, 2026Updated last month
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- ☆12Feb 24, 2023Updated 3 years ago
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 8 months ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- Yara sort☆13Updated this week
- Disk Image Mounting Script☆11Jan 22, 2026Updated last month
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Find abuse contacts for observables☆69Nov 10, 2022Updated 3 years ago
- Screenshot Shenanigans☆26Nov 20, 2017Updated 8 years ago
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- Yara Ruleset for scanning Linux servers for shells, spamming, phishing and other webserver baddies☆107Mar 4, 2021Updated 4 years ago
- JPCERT/CC public YARA rules repository☆109Nov 14, 2025Updated 3 months ago
- ☆11Dec 22, 2020Updated 5 years ago
- Security and Privacy Failures in Popular 2FA Apps☆20Oct 5, 2023Updated 2 years ago
- XOR Key Extractor☆51Aug 10, 2024Updated last year
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- Tools for preservation of floppy disks☆15Nov 22, 2025Updated 3 months ago
- ☆12Jun 29, 2021Updated 4 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 3 months ago
- Summarize CTI reports with OpenAI☆18Feb 23, 2026Updated last week