Elastic Security YARA Rules Logo

Elastic Security YARA Rules

0
Free
Visit Website

Elastic Security provides signature-based YARA rules within the Elastic Endpoint product to detect and prevent emerging threats within Linux, Windows, and macOS systems. The repository holds over 1,000 YARA rules used for stopping Trojans, ransomware, cryptominers, and more, suitable for Network Defending, Threat Hunting, Incident Response, Malware Analysis, and more. Contributions are welcome, and the rules are licensed under the Elastic License v2.

FEATURES

ALTERNATIVES

A list of most queried domains based on passive DNS usage across the Umbrella global network.

A container of PCAP captures mapped to the relevant attack tactic

GCTI's open-source detection signatures for malware and threat detection

Tools to export data from MISP MySQL database for post-incident analysis and correlation.

Aggregator of FireHOL IP lists with HTTP-based API service and Python client package.

An IOC tracker written in Python that queries Google Custom Search Engines for various cybersecurity indicators and monitors domain status using Google Safe Browsing APIs.

A Splunk app mapped to MITRE ATT&CK to guide threat hunts.

A PowerShell module for threat hunting via Windows Event Logs

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved