Yara rules to be used with the Burp Yara-Scanner extension. This collection includes rules built from malicious code samples found on the Internet and by third-parties to identify malicious software commonly hosted on websites. The rules aim to help identify infected web pages during web application assessments. The rules cover signs of infection in HTML, JavaScript, and CSS code, as well as detection of infected JAR and PDF files.
FEATURES
SIMILAR TOOLS
CyBot is a free and open source threat intelligence chat bot with a community-driven plugin framework.
A comprehensive list of APT groups and operations for tracking and mapping different names and naming schemes used by cybersecurity companies and antivirus vendors.
A platform for accessing threat intelligence and collaborating on cyber threats.
Real-time, container-based file scanning system for threat hunting and incident response.
Maltrail is a malicious traffic detection system utilizing blacklists and heuristic mechanisms.
A tool for navigating and annotating ATT&CK matrices with the ability to define custom layers for specific views.
A command-line tool that fetches known URLs from various sources to identify potential security threats and vulnerabilities.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.