Private Yara Rules Repository Logo

Private Yara Rules Repository

0
Free
Visit Website

A repository containing privately developed Yara rules that can be freely used in detection systems like CAPE sandbox, MalwareBazaar, UnPac.me, and VirusTotal. The rules adhere to the CCCS Yara rule standard and are TLP:White, allowing for free distribution. The repository also includes workflows for automatic error detection and rule packaging.

FEATURES

ALTERNATIVES

A comprehensive Threat Intelligence Program Management Solution for managing the entire CTI lifecycle.

DNSDumpster is a domain research tool for discovering and analyzing DNS records to map an organization's attack surface.

Provides indicators of compromise (IOCs) to combat malware with Yara and Snort rules.

A project focusing on understanding and combating threats to the Internet economy and net citizens.

A tool for identifying potential security threats by fetching known URLs and filtering out URLs with open redirection or SSRF parameters.

Check the reputation of an IP address to identify potential threats.

Real-time, container-based file scanning system for threat hunting and incident response.

Sample detection rules and dashboards for Google Security Operations