detection
Signature detection system
Detects malicious network and host activity using Yara, Snort, and ClamAV signatures.
Detection in the form of Yara, Snort and ClamAV signatures.
207 stars
15 watching
40 forks
Language: YARA
last commit: 20 days ago
Linked from 1 awesome list
clamavdetectioniocrulessignaturessnortyara
Related projects:
Repository | Description | Stars |
---|---|---|
x64dbg/yarasigs | A collection of Yara signatures used to identify malware and other malicious code | 85 |
jeff0falltrades/yara-signatures | A collection of signature patterns for detecting malware | 29 |
hestat/lw-yara | A Yara ruleset and scanner tool for detecting webserver malware on Linux servers. | 102 |
citizenlab/malware-signatures | Yara rules for identifying malware families in targeted threats | 134 |
cluster25/detection | A collection of threat detection rules written in YARA | 13 |
securitymagic/yara | A collection of YARA rules for detecting malware and suspicious activity in various environments. | 11 |
tjnel/yara_repo | A repository of custom Yara rules for malware analysis and research. | 9 |
fxb-cocacoding/yara-signator | Automatically generates YARA signatures for malware based on disassembly reports and curated malware repository | 155 |
xen0ph0n/yaragenerator | Automates the creation of Yara rules to detect malware and other malicious objects of interest by analyzing sample files from various sources. | 332 |
alienvault-otx/yabin | Generates Yara signatures for identifying malware code similarities | 157 |
supportintelligence/icewater | A project aiming to improve internet security by analyzing malware and malicious files using YARA rules. | 380 |
deadbits/yara-rules | A collection of YARA signatures used to detect and analyze malware | 42 |
kevthehermit/yararules | A collection of Yara rules for detecting malware and other malicious patterns | 52 |
bartblaze/yara-rules | A collection of Yara rules for detecting malware and other threats | 327 |
securingsam/krackdetector | Detects KRACK attacks and disconnects client devices from the network. | 179 |