signature-base
Signature set
A repository of YARA rules and IOCs for threat hunting and intelligence
YARA signature and IOC database for my scanners and tools
2k stars
198 watching
605 forks
Language: YARA
last commit: 7 days ago
Linked from 4 awesome lists
anti-virusdfirhashiocscannersignaturethreat-huntingthreat-intelligenceyarayara-rules
Related projects:
Repository | Description | Stars |
---|---|---|
yara-rules/rules | A repository of Yara rules for detecting malware and other security threats | 4,178 |
neo23x0/loki | A Python-based tool for detecting and analyzing simple indicators of compromise (IOCs) using various detection methods including YARA rules, file name checks, and hash comparisons. | 3,402 |
neo23x0/yargen | Generates YARA rules from malware strings while excluding goodware strings and optionally refines the rules for AI use. | 1,555 |
neo23x0/rules | A centralized repository of Yara rules for detecting malware and other malicious activities. | 10 |
tjnel/yara_repo | A repository of custom Yara rules for malware analysis and research. | 9 |
numlock15/yarastation | A centralized management portal for Loki scanner and Yara rules | 36 |
securitymagic/yara | A collection of YARA rules for detecting malware and suspicious activity in various environments. | 11 |
inquest/yara-rules | A collection of YARA rules for threat hunting and signature detection. | 363 |
alienvault-otx/yabin | Generates Yara signatures for identifying malware code similarities | 157 |
citizenlab/malware-signatures | Yara rules for identifying malware families in targeted threats | 134 |
deadbits/yara-rules | A collection of YARA signatures used to detect and analyze malware | 42 |
fxb-cocacoding/yara-signator | Automatically generates YARA signatures for malware based on disassembly reports and curated malware repository | 155 |
neo23x0/yaranalyzer | Analyzes and reports on Yara rules and files | 359 |
circl/factual-rules-generator | Generates YARA rules to identify installed software on a machine based on collected digital forensic evidence | 76 |
sophos/yaraml_rules | Automatically generates Yara rules from machine learning models trained on malware and benign data | 211 |