The yara-rules repository is a collection of YARA rules, which are used for identifying and classifying malware based on textual or binary patterns. These rules help in enhancing threat detection capabilities.
FEATURES
SIMILAR TOOLS
Lists of sources and utilities to hunt, detect, and prevent evildoers.
A tool designed to extract additional value from enterprise-wide AppCompat / AmCache data
Globally-accessible knowledge base of adversary tactics and techniques for cybersecurity.
A tool for extracting IOCs from various input sources and converting them into JSON format.
A library of Amazon S3 attack scenarios with mitigation strategies.
A repository of freely usable Yara rules for detection systems, with automated error detection workflows.
A PowerShell script to interact with the MITRE ATT&CK Framework via its own API using the deprecated MediaWiki API.
A threat intelligence platform that collects, analyzes, and operationalizes threat data from multiple sources to help organizations identify and respond to security threats.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.