PhishingKit-Yara-Rules Logo

PhishingKit-Yara-Rules

0
Free
Visit Website

This repository, dedicated to Phishing Kits zip files YARA rules, is based on zip raw format analysis to find directories and files names. It is open to all rules contribution, allowing users to create pull requests with their own set of rules to enhance detection and defense against Phishing threats. The first set of rules was created for the project PhishingKit-Yara-Search.

FEATURES

ALTERNATIVES

Repository containing IoCs related to Volexity's threat intelligence blog posts and tools.

A curated collection of Sigma & Yara rules and Indicators of Compromise (IOCs) for threat detection and malware identification.

A library of event-based analytics written in EQL to detect adversary behaviors, now integrated into the Detection Engine of Kibana.

Platform providing community-driven threat intelligence on cyber threats with a focus on malware and botnets.

Official repository of YARA rules for threat detection and hunting

A tool designed to extract additional value from enterprise-wide AppCompat / AmCache data

A collection of YARA rules for Windows, Linux, and Other threats.

A free threat intelligence feed and banlist feed of known malicious IP addresses for public use only.