Yara-Repo
Yara rule collector
A script to collect and aggregate Yara rules from various sources.
A script to collect (the most famous) Yara rules from more than 150 free resources. Free alternative to: https://valhalla.nextron-systems.com/
26 stars
3 watching
3 forks
Language: Shell
last commit: about 1 year ago
Linked from 1 awesome list
blueteamblueteamingthreat-huntingthreat-intelligencethreatintelyarayara-forensicsyara-rulesyara-signatures
Related projects:
Repository | Description | Stars |
---|---|---|
imp0rtp3/yara-rules | A repository of custom Yara rules for malware analysis and threat intelligence | 18 |
inquest/yara-rules | A collection of YARA rules for threat hunting and signature detection. | 363 |
f0wl/yara_rules | A collection of YARA rules for malware analysis and threat intelligence | 10 |
cyberdefenses/cdi_yara | A collection of YARA rules based on intelligence profiles and file work. | 19 |
tjnel/yara_repo | A repository of custom Yara rules for malware analysis and research. | 9 |
tillmannw/yara-rules | A collection of YARA rules for malware analysis and detection | 10 |
bartblaze/fara | A collection of intentionally flawed Yara rules for training security analysts | 48 |
tenable/yara-rules | A curated collection of YARA rules for identifying and flagging malicious code and behavior. | 60 |
malgamy/yara_rules | A collection of Yara rules for identifying and classifying files based on their characteristics. | 64 |
advanced-threat-research/yara-rules | A collection of rules to detect and prevent malware infections using YARA-based threat intelligence | 570 |
efforg/yaya | Automates the curation and scanning of Yara rules using a command-line interface. | 267 |
bartblaze/yara-rules | A collection of Yara rules for detecting malware and other threats | 327 |
yara-silly-silly/yarasilly2 | Automatically generates YARA rules from sample files for malware analysis | 28 |
deadbits/yara-rules | A collection of YARA signatures used to detect and analyze malware | 42 |
securitymagic/yara | A collection of YARA rules for detecting malware and suspicious activity in various environments. | 11 |