yara
Malware detection rules
A collection of YARA rules for detecting malware and suspicious activity in various environments.
Listing of YARA rules I wrote for Live and Retro hunts. Includes Jupyter infostealer, suspicious powershell, dll hijacking, vbs downloaders and maldocs.
11 stars
2 watching
1 forks
Language: YARA
last commit: about 1 year ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
| A collection of Yara rules for detecting malware and other threats | 336 |
| A collection of rules to detect and prevent malware infections using YARA-based threat intelligence | 573 |
| A collection of YARA rules for malware analysis and threat intelligence | 10 |
| Rules and patterns used to identify malicious software | 23 |
| A collection of Yara rules for detecting malicious code and behavior | 11 |
| A collection of YARA rules for detecting malicious code patterns | 334 |
| A curated collection of YARA rules for identifying and flagging malicious code and behavior. | 60 |
| A repository of pre-defined YARA rules for detecting malware and other malicious software | 126 |
| A tool used to scan files and assets for malware using Yara signatures, offering incident response capabilities. | 104 |
| A collection of YARA rules designed to identify known malware and threats | 15 |
| A collection of YARA rules for detecting malware and other malicious files. | 9 |
| A collection of YARA signatures used to detect and analyze malware | 43 |
| A collection of Yara rules for detecting malware evasion techniques and malicious activity. | 25 |
| Automatically generates YARA rules from sample files for malware analysis | 28 |
| A collection of YARA rules for malware analysis and detection | 10 |