Collection of Yara rules for file identification and classification
Collection of YARA signatures from recent malware research: - Dacls Trojan Rule: Dacls_Linux.yara - Dacls_Windows.yara - APT32 KerrDown Rule: APT32_KerrDown.yara - ACBackdoor - Linux build Rule: ACBackdoor_Linux.rule - Unnamed Linux Golang Ransomware Rule: Linux_Golang_Ransomware.rule - KPOT v2 Rule: KPOT_v2.yara - WatchBog Linux botnet Rule: WatchBog_Linux.yara - EvilGnome Linux malware Rule: EvilGnome_Linux.yara - APT34 PICKPOCKET Rule: APT34_PICKPOCKET.yara - APT34 LONGWATCH Rule: APT34_LONGWATCH.yara - APT34 VALUEVAULT Rule: APT34_VALUEVAULT.yara
Collection of Yara rules for file identification and classification
A community-driven list of sample security analytics for auditing cloud usage and detecting threats in Google Cloud.
The Cybersecurity and Infrastructure Security Agency (CISA) is a government agency that provides alerts, advisories, and resources to help protect the United States' critical infrastructure from cyber threats.
Deception based detection techniques with MITRE ATT&CK mapping and Honey Resources.
A cybersecurity concept categorizing indicators of compromise based on their level of difficulty for threat actors to change.
Hippocampe is a threat feed aggregator with configurable confidence levels and a Hipposcore for determining maliciousness.