Yara Rules Project
A repository of Yara signatures under the GNU-GPLv2 license for the cybersecurity community.
CobaltStrikeScan scans Windows process memory for evidence of DLL injection (classic or reflective injection) and/or performs a YARA scan on the target process' memory for Cobalt Strike v3 and v4 beacon signatures. It can also scan a file for Cobalt Strike beacons and parse their configuration. The tool can display the beacon's configuration if detected.
A repository of Yara signatures under the GNU-GPLv2 license for the cybersecurity community.
Search engine for Windows executable files and hashes, providing insights into file prevalence, behavior, and security information.
A daily collection of IOCs from various sources, including articles and tweets.
A collection of Yara rules for the Burp Yara-Scanner extension to identify malicious software on websites.
A collection of APT and cybercriminals campaigns with various resources and references.
Repository of YARA rules for identifying and classifying malware.