reyara

Malware analyzer rules

A set of Yara rules designed to simplify the process of reverse engineering malware by providing pre-defined patterns and signatures.

Yara rules for quick reverse engineering of malware.

GitHub

19 stars
4 watching
6 forks
last commit: almost 9 years ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
f0wl/yara_rules A collection of YARA rules for malware analysis and threat intelligence 10
securitymagic/yara A collection of YARA rules for detecting malware and suspicious activity in various environments. 11
reversinglabs/reversinglabs-yara-rules A collection of YARA rules for detecting and identifying malware and other security threats 768
tenable/yara-rules A curated collection of YARA rules for identifying and flagging malicious code and behavior. 60
advanced-threat-research/yara-rules A collection of rules to detect and prevent malware infections using YARA-based threat intelligence 570
bartblaze/yara-rules A collection of Yara rules for detecting malware and other threats 327
dissectmalware/yaradbg-backend An application backend designed to facilitate Yara rule analysis and root cause identification in malware detection. 24
neo23x0/rules A centralized repository of Yara rules for detecting malware and other malicious activities. 10
yara-rules/yara-endpoint A tool used to scan files and assets for malware using Yara signatures, offering incident response capabilities. 104
h3x2b/yara-rules Rules and patterns used to identify malicious software 23
xen0ph0n/yaragenerator Automates the creation of Yara rules to detect malware and other malicious objects of interest by analyzing sample files from various sources. 332
tjnel/yara_repo A repository of custom Yara rules for malware analysis and research. 9
filescanio/fsyara A collection of YARA rules for detecting malware and other malicious files. 8
mikesxrs/open-source-yara-rules A collection of YARA rules for detecting malicious code patterns 334
anyrun/yara A collection of YARA rules designed to identify known malware and threats 13