Elastic Security YARA Rules Logo

Elastic Security YARA Rules

0
Free
Visit Website

Elastic Security provides signature-based YARA rules within the Elastic Endpoint product to detect and prevent emerging threats within Linux, Windows, and macOS systems. The repository holds over 1,000 YARA rules used for stopping Trojans, ransomware, cryptominers, and more, suitable for Network Defending, Threat Hunting, Incident Response, Malware Analysis, and more. Contributions are welcome, and the rules are licensed under the Elastic License v2.

FEATURES

ALTERNATIVES

Threat hunting tool leveraging Windows events for identifying outliers and suspicious behavior.

Freely available network IOCs for monitoring and incident response

Lists of sources and utilities to hunt, detect, and prevent evildoers.

Gathers Threat Intelligence Feeds from publicly available sources and provides detailed output in CSV format.

A threat intelligence domain/IP/hash threat feeds checker that checks IPVoid, URLVoid, Virustotal, and Cymon.

An IOC tracker written in Python that queries Google Custom Search Engines for various cybersecurity indicators and monitors domain status using Google Safe Browsing APIs.

A repository of freely usable Yara rules for detection systems, with automated error detection workflows.

Repository with projects for photo and video hashing, content moderation, and signal exchange.

PINNED