signature-base
Signature set
A repository of YARA rules and IOCs for threat hunting and intelligence
YARA signature and IOC database for my scanners and tools
3k stars
197 watching
610 forks
Language: YARA
last commit: about 1 month ago
Linked from 4 awesome lists
anti-virusdfirhashiocscannersignaturethreat-huntingthreat-intelligenceyarayara-rules
Related projects:
Repository | Description | Stars |
---|---|---|
yara-rules/rules | A repository of Yara rules for detecting malware and other security threats | 4,215 |
neo23x0/loki | A Python-based tool for detecting and analyzing simple indicators of compromise (IOCs) using various detection methods including YARA rules, file name checks, and hash comparisons. | 3,419 |
neo23x0/yargen | Generates YARA rules from malware strings while excluding goodware strings and optionally refines the rules for AI use. | 1,569 |
neo23x0/rules | A centralized repository of Yara rules for detecting malware and other malicious activities. | 10 |
tjnel/yara_repo | A repository of custom Yara rules for malware analysis and research. | 9 |
numlock15/yarastation | A centralized management portal for Loki scanner and Yara rules | 36 |
securitymagic/yara | A collection of YARA rules for detecting malware and suspicious activity in various environments. | 11 |
inquest/yara-rules | A collection of YARA rules for threat hunting and signature detection. | 368 |
alienvault-otx/yabin | Generates Yara signatures for identifying malware code similarities | 158 |
citizenlab/malware-signatures | Yara rules for identifying malware families in targeted threats | 134 |
deadbits/yara-rules | A collection of YARA signatures used to detect and analyze malware | 43 |
fxb-cocacoding/yara-signator | Automatically generates YARA signatures for malware based on disassembly reports and curated malware repository | 157 |
neo23x0/yaranalyzer | Analyzes and reports on Yara rules and files | 362 |
circl/factual-rules-generator | Generates YARA rules to identify installed software on a machine based on collected digital forensic evidence | 76 |
sophos/yaraml_rules | Automates the creation of Yara rules from machine learning models trained on malware and benign samples. | 214 |