yara
Malware detection rules
A collection of YARA rules for detecting malware and suspicious activity in various environments.
Listing of YARA rules I wrote for Live and Retro hunts. Includes Jupyter infostealer, suspicious powershell, dll hijacking, vbs downloaders and maldocs.
11 stars
2 watching
1 forks
Language: YARA
last commit: 11 months ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
bartblaze/yara-rules | A collection of Yara rules for detecting malware and other threats | 327 |
advanced-threat-research/yara-rules | A collection of rules to detect and prevent malware infections using YARA-based threat intelligence | 570 |
f0wl/yara_rules | A collection of YARA rules for malware analysis and threat intelligence | 10 |
h3x2b/yara-rules | Rules and patterns used to identify malicious software | 23 |
jipegit/yara-rules-public | A collection of Yara rules for detecting malicious code and behavior | 11 |
mikesxrs/open-source-yara-rules | A collection of YARA rules for detecting malicious code patterns | 334 |
tenable/yara-rules | A curated collection of YARA rules for identifying and flagging malicious code and behavior. | 60 |
intezer/yara-rules | A repository of pre-defined YARA rules for detecting malware and other malicious software | 123 |
yara-rules/yara-endpoint | A tool used to scan files and assets for malware using Yara signatures, offering incident response capabilities. | 104 |
anyrun/yara | A collection of YARA rules designed to identify known malware and threats | 13 |
filescanio/fsyara | A collection of YARA rules for detecting malware and other malicious files. | 8 |
deadbits/yara-rules | A collection of YARA signatures used to detect and analyze malware | 42 |
fr0gger/yara-unprotect | A collection of Yara rules for detecting malware evasion techniques and malicious activity. | 25 |
yara-silly-silly/yarasilly2 | Automatically generates YARA rules from sample files for malware analysis | 28 |
tillmannw/yara-rules | A collection of YARA rules for malware analysis and detection | 10 |