Signature Based Detection

Explore 9 curated cybersecurity tools, with 14,630+ visitors searching for solutions

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Trellix Intrusion Prevention System Logo

A next-generation intrusion prevention system that combines signature-based and behavioral detection techniques to identify and block sophisticated network threats across hybrid environments.

0
yara-rules Logo

A repository of YARA rules for identifying and classifying malware through pattern-based detection.

0
LORG Logo

A tool for advanced HTTPD logfile security analysis and forensics, implementing various techniques to detect attacks against web applications.

0
GCTI Open Source Detection Signatures Logo

GCTI's open-source detection signatures for malware and threat detection

0
Cuckoo Mod Logo

A modified version of Cuckoo Sandbox with enhanced features and capabilities.

0
Elastic Security YARA Rules Logo

Signature-based YARA rules for detecting and preventing threats within Linux, Windows, and macOS systems.

0
Malware Signatures Overview Logo

A collection of Yara signatures developed by Citizen Lab to detect malware used in targeted attacks against civil society organizations.

0
Thinkst Canarytokens Detector and Diffuser/Nullifier Logo

A Python script that detects and removes Thinkst Canary Tokens from files using signature-based detection methods.

0
YARA Public YARA rules Logo

A community-maintained repository of YARA rules for detecting and classifying malware based on patterns and characteristics.

0