Repository of Yara rules created by the Stratosphere team
☆29Jul 8, 2021Updated 4 years ago
Alternatives and similar repositories for yara-rules
Users that are interested in yara-rules are comparing it to the libraries listed below
Sorting:
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- Random hunting ordiented yara rules☆96Mar 27, 2023Updated 2 years ago
- Python Library for ConfigExtractor☆15Feb 24, 2026Updated last week
- Scripts or utilities for radare2☆15Sep 10, 2016Updated 9 years ago
- Dump configuration from STOP Djvu ransomware sample☆12Feb 19, 2020Updated 6 years ago
- yara-python-dex enabled wheels☆11Aug 31, 2025Updated 6 months ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 2 years ago
- ☆18Dec 6, 2022Updated 3 years ago
- Collection of generic YARA rules☆16Aug 17, 2025Updated 6 months ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Apr 14, 2023Updated 2 years ago
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆23Feb 19, 2026Updated 2 weeks ago
- ☆128Feb 2, 2025Updated last year
- ☆44Feb 26, 2024Updated 2 years ago
- Tapir: a tool to search through NIST CVE database, with cache and regex.☆16Jan 20, 2023Updated 3 years ago
- A C++ Yara Rule Runner☆13Apr 22, 2022Updated 3 years ago
- Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs…☆39Apr 27, 2025Updated 10 months ago
- Indicators of compromise☆17Jan 29, 2026Updated last month
- generate yara-androguard report on your local and scan☆12Oct 3, 2019Updated 6 years ago
- Rules shared by the community from 100 Days of YARA 2024☆89Jan 1, 2025Updated last year
- Advanced usage of the ptrace syscall in order to implement a more resistent anti debugging feature☆17Jan 7, 2017Updated 9 years ago
- Yara Rules for Modern Malware☆78Mar 3, 2024Updated 2 years ago
- A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.☆18Nov 11, 2021Updated 4 years ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Feb 12, 2024Updated 2 years ago
- Malicious PDF document parsing tool☆16Nov 1, 2017Updated 8 years ago
- Collection of rules created using YARA-Signator over Malpedia☆141Jan 6, 2026Updated last month
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- gopclntab finder and analyzer for Radare2☆21Aug 15, 2020Updated 5 years ago
- a modified version base on Tracecorn☆20Oct 29, 2019Updated 6 years ago
- ☆24Jul 6, 2018Updated 7 years ago
- ☆23Jul 7, 2023Updated 2 years ago
- 简单的Linux远程控制☆20Jun 3, 2017Updated 8 years ago
- Repository of Yara rules dedicated to Phishing Kits Zip files☆238Feb 9, 2026Updated 3 weeks ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Comment rebasing for IDA Pro☆27Apr 6, 2020Updated 5 years ago
- A specification and style guide for YARA rules☆68Feb 17, 2024Updated 2 years ago
- Malware dynamic instrumentation tool based on frida framework☆110Jun 7, 2020Updated 5 years ago
- Configuration Extractors for Malware☆124Apr 23, 2025Updated 10 months ago
- 一款http协议的漏洞扫描框架☆27Jan 17, 2020Updated 6 years ago
- ☆64Apr 1, 2021Updated 4 years ago