sophos / yaraml_rules
Security ML models encoded as Yara rules
☆214Updated last year
Alternatives and similar repositories for yaraml_rules:
Users that are interested in yaraml_rules are comparing it to the libraries listed below
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆104Updated 3 weeks ago
- ☆148Updated 2 years ago
- Community modules for CAPE Sandbox☆95Updated last week
- c2 traffic☆188Updated 2 years ago
- Automatic YARA rule generation for Malpedia☆159Updated 2 years ago
- Parse YARA rules and operate over them more easily.☆187Updated 2 months ago
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆137Updated 4 years ago
- IOC from articles, tweets for archives☆313Updated last year
- Automated Yara Rule generation using Biclustering☆66Updated 3 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- ☆164Updated 4 years ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆374Updated 2 years ago
- Collection of rules created using YARA-Signator over Malpedia☆127Updated 5 months ago
- Malware repository component for samples & static configuration with REST API interface.☆343Updated last month
- A guide on how to write fast and memory friendly YARA rules☆142Updated 2 months ago
- YARA Rules I come across on the internet☆337Updated last year
- Sigma rules from Joe Security☆209Updated 5 months ago
- Signature engine for all your logs☆167Updated last year
- ☆125Updated 2 months ago
- ☆98Updated 4 years ago
- Automatically create YARA rules from malicious documents.☆211Updated 2 years ago
- A Yara rule generator for finding related samples and hunting☆158Updated 2 years ago
- DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted …☆313Updated 2 months ago
- PCAP Samples for Different Post Exploitation Techniques☆356Updated 3 years ago
- ☆130Updated last year
- Extension to Cuckoo Sandbox open source projects, adds support to AWS cloud functionalities and enables running emulation on auto-scaling…☆136Updated 3 years ago
- Threat Report ATT&CK™ Mapping (TRAM) is a tool to aid analyst in mapping finished reports to ATT&CK.☆349Updated 3 years ago
- Various capabilities for static malware analysis.☆77Updated 7 months ago
- YARA rule analyzer to improve rule quality and performance☆98Updated 2 weeks ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆261Updated 6 years ago