Rule Engine

Explore 20 curated cybersecurity tools, with 15,538+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
Cloudflare WAF Logo

A cloud-based web application firewall that protects applications from various cyber threats through rule-based filtering, machine learning detection, and integrated security features.

0
Yara-Java Logo

Embeddable Yara library for Java with support for loading rules and scanning data.

0
YaraDbg Logo

A free web-based Yara debugger for security analysts to write hunting or detection rules with ease.

0
yaml2yara Logo

A tool for creating custom detection rules from YAML input

0
Detection Content Repository Logo

Repository for detection content with various types of rules and payloads.

0
Detection and Hunting Signatures Logo

A set of interrelated detection rules for improving detection and hunting visibility and context

0
YARA Rules for ProcFilter Logo

YARA rules for ProcFilter to detect malware and threats

0
YARA Matches Correspondance Array (YMCA) Logo

Tool for visualizing correspondences between YARA ruleset and samples

0
Plyara Logo

Parse YARA rules into a dictionary representation.

0
FireEye Red Team Tool Countermeasures Logo

A set of rules for detecting threats in various formats, including Snort, Yara, ClamAV, and HXIOC.

0
yaramod Logo

Yaramod is a library for parsing YARA rules into AST and building new YARA rulesets with C++ programming interface.

0
yara-rust Logo

Bindings for the Yara library from VirusTotal with support for Yara v4.2 and various features like rule compilation and scanning.

0
Sublime Rules Logo

Open-source rules for detecting and preventing email attacks like BEC, malware, and credential phishing.

0
Shotgunyara Logo

A tool that generates Yara rules for strings and their XOR encoded versions, as well as base64-encoded variations with different padding possibilities.

0
ReversingLabs YARA Rules Logo

Official repository of YARA rules for threat detection and hunting

0
yara-parser Logo

A Go library for manipulating YARA rulesets with the ability to programatically change metadata, rule names, and more.

0
yara_repo Logo

Repository of Yara Rules created by TjNel.

0
StreamAlert Logo

Serverless, real-time data analysis framework for incident detection and response.

0
event-generator Logo

A testing tool that generates suspect actions to validate and test Falco runtime security monitoring rulesets.

0