This repository simplifies access to and synchronization of Malpedia's automatically generated YARA rules by Felix Bilstein using YARA-Signator, released under CC BY-SA 4.0 license. Latest Release: 2023-12-08. Statistics: Samples (all): 13868, Samples (detectable): 5647, Families: 3009. True Positives: 5438, False Positives: 27, True Negatives: 6749, False Negatives: 209. PPV / Precision: 0.995, TPR / Recall: 0.963, F1: 0.979.
Common questions about Malpedia's YARA-Signator Rules including features, pricing, alternatives, and user reviews.
Malpedia's YARA-Signator Rules is Repository of automatically generated YARA rules from Malpedia's YARA-Signator with detailed statistics. It is a Security Operations solution designed to help security teams with YARA, Cyber Threat Intelligence.
Malpedia's YARA-Signator Rules is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/malpedia/signator-rules/ for download and installation instructions.
Popular alternatives to Malpedia's YARA-Signator Rules include:
Compare these tools and more at https://cybersectools.com/categories/security-operations
Malpedia's YARA-Signator Rules is for security teams and organizations that need YARA, Cyber Threat Intelligence. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Managed Agentic Threat Hunting Service (IOC sweeps and hypothesis based hunting)
Expands a single malware hash into full family visibility via structural analysis.
Define and validate YARA rule metadata with CCCS YARA Specification.