god-mode-rules
Cyber threat rules
Rules for detecting cyber threats in various attack vectors
God Mode Detection Rules
131 stars
7 watching
21 forks
Language: YARA
last commit: 4 months ago Related projects:
Repository | Description | Stars |
---|---|---|
neo23x0/rules | A centralized repository of Yara rules for detecting malware and other malicious activities. | 10 |
h3x2b/yara-rules | Rules and patterns used to identify malicious software | 23 |
neo23x0/yargen | Generates YARA rules from malware strings while excluding goodware strings and optionally refines the rules for AI use. | 1,555 |
securitymagic/yara | A collection of YARA rules for detecting malware and suspicious activity in various environments. | 11 |
f0wl/yara_rules | A collection of YARA rules for malware analysis and threat intelligence | 10 |
cyberdefenses/cdi_yara | A collection of YARA rules based on intelligence profiles and file work. | 19 |
cluster25/detection | A collection of threat detection rules written in YARA | 13 |
mikesxrs/open-source-yara-rules | A collection of YARA rules for detecting malicious code patterns | 334 |
neo23x0/yara-style-guide | A style guide for creating YARA rules to enhance readability and usability | 37 |
filescanio/fsyara | A collection of YARA rules for detecting malware and other malicious files. | 8 |
jipegit/yara-rules-public | A collection of Yara rules for detecting malicious code and behavior | 11 |
advanced-threat-research/yara-rules | A collection of rules to detect and prevent malware infections using YARA-based threat intelligence | 570 |
citizenlab/malware-signatures | Yara rules for identifying malware families in targeted threats | 134 |
neo23x0/yaranalyzer | Analyzes and reports on Yara rules and files | 359 |
neo23x0/fnord | Extracts patterns from obfuscated code and generates YARA rules based on sequence statistics | 296 |