InQuest YARA Rules Logo

InQuest YARA Rules

0
Free
Updated 11 March 2025
Visit Website

A collection of YARA rules from InQuest for research and hunting purposes, including rules for Base64 Encoded Powershell, Embedded PE Files, Hex Encoded Powershell, and more. For further reading and references, visit the provided links.

FEATURES

SIMILAR TOOLS

OpenIOC editor for building and manipulating threat intelligence data with support for various systems.

Stay informed with Rapid7's cybersecurity blog and vulnerability news updates.

A mapping tool that correlates MITRE ATT&CK techniques with atomic tests and detection rules to analyze security detection coverage.

The Cybersecurity and Infrastructure Security Agency (CISA) is a government agency that provides alerts, advisories, and resources to help protect the United States' critical infrastructure from cyber threats.

A curated collection of Sigma & Yara rules and Indicators of Compromise (IOCs) for threat detection and malware identification.

A tracker that detects and logs SYN packets with a specific signature generated by the Mirai malware, providing real-time information on Mirai-based campaigns.

A PowerShell script to interact with the MITRE ATT&CK Framework via its own API using the deprecated MediaWiki API.

A collection of tools and resources for threat hunters.

PolySwarm is a malware intelligence marketplace that aggregates threat detection engines to provide early detection, unique samples, and higher accuracy.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

Copyright © 2025 - All rights reserved