Private Yara Rules Repository Logo

Private Yara Rules Repository

0
Free
Visit Website

A repository containing privately developed Yara rules that can be freely used in detection systems like CAPE sandbox, MalwareBazaar, UnPac.me, and VirusTotal. The rules adhere to the CCCS Yara rule standard and are TLP:White, allowing for free distribution. The repository also includes workflows for automatic error detection and rule packaging.

FEATURES

ALTERNATIVES

PolySwarm is a malware intelligence marketplace that aggregates threat detection engines to provide early detection, unique samples, and higher accuracy.

A mapping tool that correlates MITRE ATT&CK techniques with atomic tests and detection rules to analyze security detection coverage.

Parse IOCs from text

A cybersecurity concept categorizing indicators of compromise based on their level of difficulty for threat actors to change.

Real-time, container-based file scanning system for threat hunting and incident response.

Scan files with Yara, match findings to VirusTotal comments.

A threat intelligence service providing actionable IoCs and security data feeds to help organizations detect, block, and respond to cyber threats.

Sigma is a generic and open signature format for SIEM systems and other security tools to detect and respond to threats.

PINNED