yaml2yara Logo

yaml2yara

0
Free
Visit Website

This project, released under the AGPL license by NCC Group Plc and developed by David Cannings, contains a script that generates custom detection rules from YAML input, allowing for easy updating and optimization of bulk rules to take advantage of new YARA features. It aims to store data in a human-readable format, generate rules effortlessly, and produce output compatible with source code management tools like Git and Mercurial.

FEATURES

ALTERNATIVES

Open Source Intelligence solution for threat intelligence data enrichment and quick analysis of suspicious files or malware.

A threat exposure management platform that monitors clear and dark web environments to detect and provide actionable intelligence on potential security threats like data leaks, credentials, and malicious actor activities.

Modular Threat Hunting Tool & Framework

Proof-of-concept implementation of TAXII services for developers and non-developers.

A collection of Yara rules licensed under the DRL 1.1 License.

Provides advanced external threat intelligence to help organizations proactively identify and mitigate potential security threats.

YARA signature and IOC database for LOKI and THOR Lite scanners with high quality rules and IOCs.

In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.