Yara-rules

Malware detector

A collection of Yara rules for detecting malware and other threats

Collection of private Yara rules.

GitHub

327 stars
23 watching
56 forks
Language: YARA
last commit: 3 months ago
Linked from 1 awesome list

malware-detectionransomware-detectionthreat-huntingthreat-intelligenceyarayara-rulesyara-signatures

Backlinks from these awesome lists:

Related projects:

Repository Description Stars
securitymagic/yara A collection of YARA rules for detecting malware and suspicious activity in various environments. 11
advanced-threat-research/yara-rules A collection of rules to detect and prevent malware infections using YARA-based threat intelligence 570
bartblaze/fara A collection of intentionally flawed Yara rules for training security analysts 48
f0wl/yara_rules A collection of YARA rules for malware analysis and threat intelligence 10
fr0gger/yara-unprotect A collection of Yara rules for detecting malware evasion techniques and malicious activity. 25
deadbits/yara-rules A collection of YARA signatures used to detect and analyze malware 42
h3x2b/yara-rules Rules and patterns used to identify malicious software 23
jipegit/yara-rules-public A collection of Yara rules for detecting malicious code and behavior 11
mikesxrs/open-source-yara-rules A collection of YARA rules for detecting malicious code patterns 334
reversinglabs/reversinglabs-yara-rules A collection of YARA rules for detecting and identifying malware and other security threats 768
tenable/yara-rules A curated collection of YARA rules for identifying and flagging malicious code and behavior. 60
yara-rules/yara-endpoint A tool used to scan files and assets for malware using Yara signatures, offering incident response capabilities. 104
intezer/yara-rules A repository of pre-defined YARA rules for detecting malware and other malicious software 123
filescanio/fsyara A collection of YARA rules for detecting malware and other malicious files. 8
xen0ph0n/yaragenerator Automates the creation of Yara rules to detect malware and other malicious objects of interest by analyzing sample files from various sources. 332