YARA Rules Collection
Collection of YARA signatures from recent malware research.

YARA Rules Collection
Collection of YARA signatures from recent malware research.
YARA Rules Collection Description
Collection of YARA signatures from recent malware research: - Dacls Trojan Rule: Dacls_Linux.yara - Dacls_Windows.yara - APT32 KerrDown Rule: APT32_KerrDown.yara - ACBackdoor - Linux build Rule: ACBackdoor_Linux.rule - Unnamed Linux Golang Ransomware Rule: Linux_Golang_Ransomware.rule - KPOT v2 Rule: KPOT_v2.yara - WatchBog Linux botnet Rule: WatchBog_Linux.yara - EvilGnome Linux malware Rule: EvilGnome_Linux.yara - APT34 PICKPOCKET Rule: APT34_PICKPOCKET.yara - APT34 LONGWATCH Rule: APT34_LONGWATCH.yara - APT34 VALUEVAULT Rule: APT34_VALUEVAULT.yara
YARA Rules Collection FAQ
Common questions about YARA Rules Collection including features, pricing, alternatives, and user reviews.
YARA Rules Collection is Collection of YARA signatures from recent malware research.. It is a Security Operations solution designed to help security teams with YARA, Signature, Cyber Threat Intelligence.
ALTERNATIVES
Expands a single malware hash into full family visibility via structural analysis.
A repository of Yara signatures under the GNU-GPLv2 license for the cybersecurity community.
POPULAR
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox