Elastic Security provides signature-based YARA rules within the Elastic Endpoint product to detect and prevent emerging threats within Linux, Windows, and macOS systems. The repository holds over 1,000 YARA rules used for stopping Trojans, ransomware, cryptominers, and more, suitable for Network Defending, Threat Hunting, Incident Response, Malware Analysis, and more. Contributions are welcome, and the rules are licensed under the Elastic License v2.

FEATURES

This tool is not verified yet and doesn't have listed features.

Did you submit the verified tool? Sign in to add features.

Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.

ALTERNATIVES

Real-time monitoring tool for newly issued SSL certificates.

Search engine for Windows executable files and hashes, providing insights into file prevalence, behavior, and security information.

A list of most queried domains based on passive DNS usage across the Umbrella global network.

A curated list of resources for learning about deploying, managing, and hunting with Microsoft Sysmon.

A collection of YARA rules for Windows, Linux, and Other threats.