detection
Threat detection rules
A collection of threat detection rules written in YARA
Threat Detection Rules (Snort/Sigma/Yara)
13 stars
3 watching
1 forks
Language: YARA
last commit: about 1 year ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
| A collection of rules to detect and prevent malware infections using YARA-based threat intelligence | 573 |
| A collection of YARA rules for detecting malware and suspicious activity in various environments. | 11 |
| A collection of YARA-L 2.0 sample rules and dashboards for threat detection in Google Security Operations | 326 |
| A collection of YARA rules based on intelligence profiles and file work. | 19 |
| Rules and patterns used to identify malicious software | 23 |
| A collection of YARA rules for malware analysis and threat intelligence | 10 |
| A collection of YARA rules for detecting malware and other malicious files. | 9 |
| A centralized repository of Yara rules for detecting malware and other malicious activities. | 10 |
| A repository of custom Yara rules for malware analysis and threat intelligence | 18 |
| A collection of Yara rules for detecting malware and other threats | 336 |
| A collection of Yara rules for detecting malicious code and behavior | 11 |
| A collection of YARA rules for detecting malicious code patterns | 334 |
| A collection of pre-written yara rules for identifying potential threats in digital systems | 96 |
| A repository of detection content in the form of YARA rules and corresponding payloads. | 63 |
| A collection of Yara rules for detecting malware evasion techniques and malicious activity. | 25 |