Welcome to the official ReversingLabs YARA rules repository! The repository will be updated continuously, as we develop rules for new threats, and after their quality has been proven through testing in our cloud and other environments. These rules have been written by our threat analysts, for threat hunters, incident responders, security analysts, and other defenders that could benefit from deploying high-quality threat detection YARA rules in their environment. Our detection rules, as opposed to hunting rules, need to satisfy certain criteria to be eligible for deployment, namely: * be as precise as possible, without losing detection quality * aim to provide zero false-positive detections In order for the rules to be easy to understand and maintain, we adopted the following set of goals: * clearly named byte patterns * readable and transparent conditions * match unique malware functionality * prefer code byte patterns over strings To ensure the quality of our rules, we continuously and extensively test them in our cloud, on over 10B (and rising) unique binaries. Rules are evaluated on every layer to detect threats within layered objects, such as packed PE files, documents, and other types of files.
FEATURES
ALTERNATIVES
Facilitating exchange of information and knowledge to collectively protect against cyberattacks.
A free threat intelligence feed and banlist feed of known malicious IP addresses for public use only.
A tool for tracking, scanning, and filtering yara files with distributed scanning capabilities.
A project that detects malicious SSL connections by identifying and blacklisting SSL certificates used by botnet C&C servers and identifying JA3 fingerprints to detect and block malware botnet C&C communication.
A reference implementation for collecting events and performing CAR analytics to detect potential adversary activity.
A collection of YARA rules for research and hunting purposes.
Automatic YARA rule generator based on Koodous reports with limited false positives.
PINNED
Fabric Platform by BlackStork
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Mandos Brief Newsletter
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.