Collection of YARA signatures from recent malware research: - Dacls Trojan Rule: Dacls_Linux.yara - Dacls_Windows.yara - APT32 KerrDown Rule: APT32_KerrDown.yara - ACBackdoor - Linux build Rule: ACBackdoor_Linux.rule - Unnamed Linux Golang Ransomware Rule: Linux_Golang_Ransomware.rule - KPOT v2 Rule: KPOT_v2.yara - WatchBog Linux botnet Rule: WatchBog_Linux.yara - EvilGnome Linux malware Rule: EvilGnome_Linux.yara - APT34 PICKPOCKET Rule: APT34_PICKPOCKET.yara - APT34 LONGWATCH Rule: APT34_LONGWATCH.yara - APT34 VALUEVAULT Rule: APT34_VALUEVAULT.yara
Common questions about YARA Rules Collection including features, pricing, alternatives, and user reviews.
YARA Rules Collection is Collection of YARA signatures from recent malware research. It is a Security Operations solution designed to help security teams with YARA, Signature, Cyber Threat Intelligence.
YARA Rules Collection is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/deadbits/yara-rules/ for download and installation instructions.
Popular alternatives to YARA Rules Collection include:
Compare these tools and more at https://cybersectools.com/categories/security-operations
YARA Rules Collection is for security teams and organizations that need YARA, Signature, Cyber Threat Intelligence. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Managed Agentic Threat Hunting Service (IOC sweeps and hypothesis based hunting)
A repository of Yara signatures under the GNU-GPLv2 license for the cybersecurity community.
Expands a single malware hash into full family visibility via structural analysis.