A collection of Yara rules licensed under the DRL 1.1 License.
Deception based detection techniques mapped to the MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™): Windows Technique Matrix Linux Technique Matrix Mac Technique Matrix. Deception Stories: A sample deception story is created as a reference. More deception stories will be added soon. Stay tuned! A Useful List of Honey Resources. TODO: Complete other techniques, Add more deception stories, Add Cloud-based deception stories.
A collection of Yara rules licensed under the DRL 1.1 License.
Stay informed with Rapid7's cybersecurity blog and vulnerability news updates.
Scan files with Yara, match findings to VirusTotal comments.
Official repository of YARA rules for threat detection and hunting
Yara rule generator using VirusTotal code similarity feature code-similar-to.
Maltiverse automates Threat Intelligence for small and medium-sized SecOps teams, providing an effective and affordable service.