Yara-Rules
Malware detector rules
A collection of rules to detect and prevent malware infections using YARA-based threat intelligence
Repository of YARA rules made by Trellix ATR Team
573 stars
52 watching
80 forks
Language: YARA
last commit: about 1 year ago
Linked from 2 awesome lists
iocsthreat-huntingthreat-intelligenceyara
Related projects:
Repository | Description | Stars |
---|---|---|
| A collection of YARA rules for detecting malware and suspicious activity in various environments. | 11 |
| A collection of Yara rules for detecting malware and other threats | 336 |
| A collection of YARA rules for malware analysis and threat intelligence | 10 |
| A collection of YARA rules for detecting malicious code patterns | 334 |
| Rules and patterns used to identify malicious software | 23 |
| A curated collection of YARA rules for identifying and flagging malicious code and behavior. | 60 |
| A collection of Yara rules for detecting malicious code and behavior | 11 |
| A repository of custom Yara rules for malware analysis and threat intelligence | 18 |
| A tool used to scan files and assets for malware using Yara signatures, offering incident response capabilities. | 104 |
| A collection of Yara rules for detecting malware evasion techniques and malicious activity. | 25 |
| A collection of YARA rules for detecting and identifying malware and other security threats | 776 |
| A repository of pre-defined YARA rules for detecting malware and other malicious software | 126 |
| A collection of YARA rules designed to identify known malware and threats | 15 |
| A collection of YARA rules for malware analysis and detection | 10 |
| A collection of threat detection rules written in YARA | 13 |