YARA Rules Collection Logo

YARA Rules Collection

0
Free
Visit Website

Collection of YARA signatures from recent malware research: - Dacls Trojan Rule: Dacls_Linux.yara - Dacls_Windows.yara - APT32 KerrDown Rule: APT32_KerrDown.yara - ACBackdoor - Linux build Rule: ACBackdoor_Linux.rule - Unnamed Linux Golang Ransomware Rule: Linux_Golang_Ransomware.rule - KPOT v2 Rule: KPOT_v2.yara - WatchBog Linux botnet Rule: WatchBog_Linux.yara - EvilGnome Linux malware Rule: EvilGnome_Linux.yara - APT34 PICKPOCKET Rule: APT34_PICKPOCKET.yara - APT34 LONGWATCH Rule: APT34_LONGWATCH.yara - APT34 VALUEVAULT Rule: APT34_VALUEVAULT.yara

FEATURES

ALTERNATIVES

OpenPhish provides real-time phishing trends, detecting new phishing URLs and targeting various brands.

Generate Bro intel files from pdf or html reports.

Daily feed of bad IPs with blacklist hit scores for cybersecurity professionals to stay informed about malicious IP addresses.

Maltego transform pack for analyzing and graphing Honeypots using MySQL data.

Globally-accessible knowledge base of adversary tactics and techniques for cybersecurity.

API for querying domain security information, categorization, and related data.

Aggregator of FireHOL IP lists with HTTP-based API service and Python client package.

A platform providing an activity feed on exploited vulnerabilities.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved