A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work. This collection of YARA rules is designed to help identify and detect various types of malware and threats. It is intended for use by security professionals and researchers to aid in the detection and analysis of malware and other types of threats.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A cheat sheet for default credentials to aid in penetration testing and vulnerability assessment
Automate the process of writing YARA rules based on executable code within malware.
A .Net wrapper library for the native Yara library with interoperability and portability features.
An advanced cross-platform tool for detecting and exploiting SQL injection security flaws
Dalfox is a powerful open-source XSS scanner and utility focused on automation.
A debugger tool for reverse engineers, crackers, and security analysts, with a user-friendly debugging UI and custom agent support.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.