Threat Management
yara

Other Tags in this Category

FEATURED

Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.

Reach out!

NEW

A collection of YARA rules for Windows, Linux, and Other threats.

Automated framework for collecting and processing samples from VirusTotal with YARA rule integration.

A repository of freely usable Yara rules for detection systems, with automated error detection workflows.

A StalkPhish Project YARA repository for Phishing Kits zip files.

A tool for creating custom detection rules from YAML input

Repository for detection content with various types of rules and payloads.

A collection of YARA rules for research and hunting purposes.

Scan files or process memory for Cobalt Strike beacons and parse their configuration.

yarAnalyzer creates statistics on a yara rule set and files in a sample directory, generating tables and CSV files, including an inventory feature.

FireEye Mandiant SunBurst Countermeasures: freely available rules for detecting malicious files and activity

A python3 application for querying sites hosting publicly pasted data and scanning for sensitive information.

A set of rules for detecting threats in various formats, including Snort, Yara, ClamAV, and HXIOC.

A collection of public YARA signatures for various malware families.

A parsing tool for Yara Scan Service's JSON output file to help maximize benefits and automate parsing of Yara Scan Service results.

Signature-based YARA rules for detecting and preventing threats within Linux, Windows, and macOS systems.

Forager Logo

Forager

0 (0)

Forager is a threat intelligence tool that simplifies the retrieval, storage, and maintenance of threat data with a user-friendly interface and support for various data sources.

YaYaGen Logo

YaYaGen

0 (0)

Automatic YARA rule generator based on Koodous reports with limited false positives.

Collection of Yara rules for file identification and classification

Repository of automatically generated YARA rules from Malpedia's YARA-Signator with detailed statistics.

A curated collection of Sigma & Yara rules and Indicators of Compromise (IOCs) for threat detection and malware identification.

YARA signature and IOC database for LOKI and THOR Lite scanners with high quality rules and IOCs.

Automatically curate open-source Yara rules and run scans with YAYA.

A collection of Yara rules licensed under the DRL 1.1 License.

A daily collection of IOCs from various sources, including articles and tweets.

Provides indicators of compromise (IOCs) to combat malware with Yara and Snort rules.

LOKI Logo

LOKI

0 (0)

LOKI is a simple IOC and YARA Scanner for Indicators of Compromise Detection.

A tool for quick and effective Yara rule creation to isolate malware families and malicious objects.

A repository of Yara signatures under the GNU-GPLv2 license for the cybersecurity community.

ProcFilter is a process filtering system for Windows with built-in YARA integration, designed for malware analysts to create YARA signatures for Windows environments.

C# wrapper around Yara pattern matching library with Loki and Yara signature support.

Spyre Logo

Spyre

0 (0)

A simple, self-contained modular host-based IOC scanner for incident responders.

A tool for tracking, scanning, and filtering yara files with distributed scanning capabilities.