This repository simplifies access to and synchronization of Malpedia's automatically generated YARA rules by Felix Bilstein using YARA-Signator, released under CC BY-SA 4.0 license. Latest Release: 2023-12-08. Statistics: Samples (all): 13868, Samples (detectable): 5647, Families: 3009. True Positives: 5438, False Positives: 27, True Negatives: 6749, False Negatives: 209. PPV / Precision: 0.995, TPR / Recall: 0.963, F1: 0.979.
FEATURES
ALTERNATIVES
eCrimeLabs provides a SOAR platform for threat detection and response, integrated with MISP.
A system for collecting, managing, and distributing security information on a large scale, developed by CERT Polska.
AbuseHelper is an open-source framework for receiving and redistributing abuse feeds and threat intel.
Nessus efficiently scans for system vulnerabilities, misconfigurations, and compliance issues.
A community-driven list of sample security analytics for auditing cloud usage and detecting threats in Google Cloud.
An all-in-one email outreach platform for finding and connecting with professionals, with features for lead discovery, email verification, and cold email campaigns.
CAPEC™ is a comprehensive dictionary of known attack patterns used by adversaries to exploit weaknesses in cyber-enabled capabilities.
Stixview is a JS library for embeddable interactive STIX2 graphs, aiming to bridge the gap between CTI stories and structured CTI snapshots.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Check Point CloudGuard WAF
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.