Malpedia's YARA-Signator Rules Logo

Malpedia's YARA-Signator Rules

0
Free
Updated 11 March 2025
Visit Website

This repository simplifies access to and synchronization of Malpedia's automatically generated YARA rules by Felix Bilstein using YARA-Signator, released under CC BY-SA 4.0 license. Latest Release: 2023-12-08. Statistics: Samples (all): 13868, Samples (detectable): 5647, Families: 3009. True Positives: 5438, False Positives: 27, True Negatives: 6749, False Negatives: 209. PPV / Precision: 0.995, TPR / Recall: 0.963, F1: 0.979.

FEATURES

SIMILAR TOOLS

A project that detects malicious SSL connections by identifying and blacklisting SSL certificates used by botnet C&C servers and identifying JA3 fingerprints to detect and block malware botnet C&C communication.

Real-time, container-based file scanning system for threat hunting and incident response.

Maltiverse automates Threat Intelligence for small and medium-sized SecOps teams, providing an effective and affordable service.

A Python library for interacting with TAXII servers

Stixview is a JS library for embeddable interactive STIX2 graphs, aiming to bridge the gap between CTI stories and structured CTI snapshots.

Parse IOCs from text

HoneyDB is a honeypot-based threat intelligence platform that provides real-time insights into attacker behavior and malicious activity on networks.

An open source threat intelligence platform for storing and managing cyber threat intelligence knowledge.

Python-based client for IBM XForce Exchange with an improved version available.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved