wrayjustin / yaids
YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (IDS) utilizing Yara and multi-threading
☆22Updated 2 years ago
Alternatives and similar repositories for yaids:
Users that are interested in yaids are comparing it to the libraries listed below
- Yara rules for malicious javascript files from public repositories or written by me.☆11Updated 3 years ago
- A collection of my public YARA signatures for various malware families☆29Updated 3 months ago
- A map displaying threat actors from the misp-galaxy☆32Updated 2 years ago
- Carving tool based in Radare2 & Yara☆15Updated 6 years ago
- Python based CLI for MalwareBazaar☆36Updated 2 months ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆30Updated 4 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Links to malware-related YARA rules☆14Updated 2 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- Collection of YARA signatures from individual research☆42Updated last year
- Yara Based Detection Engine for web browsers☆47Updated 3 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆57Updated 4 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆37Updated last week
- ☆22Updated 4 years ago
- ☆24Updated 2 years ago
- This repository regroups the Yara Rules for the Unprotect Project☆24Updated 4 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated 11 months ago
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆27Updated 10 months ago
- Lightweight Python-Based Malware Analysis Pipeline☆30Updated this week
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆36Updated 10 months ago
- Suricata rule and intel index☆30Updated last month
- CyCAT.org API back-end server including crawlers☆30Updated last year
- Automatic detection engineering technical state compliance☆53Updated 6 months ago
- Imphash-like calculation on Golang binaries☆49Updated 2 years ago
- Tracking APT IOCs☆25Updated 4 years ago
- Scripts and lists to help generate YARA friendly string mutations☆19Updated last year
- ☆23Updated 9 months ago
- Yara rules for detecting malware☆23Updated 4 months ago