YARA rules for malware detection
-
Updated
Sep 2, 2016
YARA rules for malware detection
My yara rules repository
S_yara-ruleset is based on Web Malwares (Open Source)
A set of YARA rules for the AIL framework to detect leak or information disclosure
Binary analysis and management framework
Yara rules
Factual rules are YARA rules to find legitimate software on raw disk acquisition.
An ongoing collection of awesome tools and frameworks, best security software practices, libraries, learning tutorials, frameworks, academic and practical resources about YARA in cybersecurity
A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.
Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-strike/sleep-mask-kit-iocs
Signatures for any cool analysis I may do
The goal of this program is to quickly pull and install repos from its list
windows apps analysis toolkit
This is a gui script that takes a pe file and creates a yara file to detect it
YARA rules for malware detection
Decision Tree-Based Signature Generation Framework for IoT Malware Detection
A script to collect (the most famous) Yara rules from more than 150 free resources. Free alternative to: https://valhalla.nextron-systems.com/
clava 🔍: Generate Code-Based Yara Rules using Machine Learning.
Welcome to the Pressidium® Yara Rules repository. This section contains a carefully curated collection of Yara rules specifically designed to detect and prevent WordPress or PHP malware and viruses, ensuring a safer online environment.
Add a description, image, and links to the yara-signatures topic page so that developers can more easily learn about it.
To associate your repository with the yara-signatures topic, visit your repo's landing page and select "manage topics."