PhishingKit-Yara-Rules Logo

PhishingKit-Yara-Rules

0
Free
Visit Website

This repository, dedicated to Phishing Kits zip files YARA rules, is based on zip raw format analysis to find directories and files names. It is open to all rules contribution, allowing users to create pull requests with their own set of rules to enhance detection and defense against Phishing threats. The first set of rules was created for the project PhishingKit-Yara-Search.

FEATURES

ALTERNATIVES

A comprehensive list of APT groups and operations for tracking and mapping different names and naming schemes used by cybersecurity companies and antivirus vendors.

A Pythonic framework for automated threat modeling shifting left.

A collection of Yara rules licensed under the DRL 1.1 License.

CINSscore.com provides Threat Intelligence database with accurate IP scores and collective defense through community and Sentinel IPS unit sourced data.

Check the reputation of an IP address to identify potential threats.

A threat intelligence domain/IP/hash threat feeds checker that checks IPVoid, URLVoid, Virustotal, and Cymon.

A visualization tool for threat analysis that organizes APT campaign information and visualizes relations of IOC.

YARA signature and IOC database for LOKI and THOR Lite scanners with high quality rules and IOCs.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved