Elastic Security YARA Rules Logo

Elastic Security YARA Rules

0
Free
Updated 11 March 2025
Visit Website

Elastic Security provides signature-based YARA rules within the Elastic Endpoint product to detect and prevent emerging threats within Linux, Windows, and macOS systems. The repository holds over 1,000 YARA rules used for stopping Trojans, ransomware, cryptominers, and more, suitable for Network Defending, Threat Hunting, Incident Response, Malware Analysis, and more. Contributions are welcome, and the rules are licensed under the Elastic License v2.

FEATURES

SIMILAR TOOLS

A daily updated summary of security advisories from various sources

Repository of Yara Rules created by TjNel.

A curated list of resources for learning about deploying, managing, and hunting with Microsoft Sysmon.

CLI tool for ThreatCrowd.org with multiple query functions.

A set of configuration files to use with EclecticIQ's OpenTAXII implementation for MISP integration.

A community-driven public malware repository providing access to malware samples, tools, and resources for the cybersecurity community.

C# wrapper around Yara pattern matching library with Loki and Yara signature support.

Platform providing community-driven threat intelligence on cyber threats with a focus on malware and botnets.

A parsing tool for Yara Scan Service's JSON output file to help maximize benefits and automate parsing of Yara Scan Service results.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved