YARA Rules Collection Logo

YARA Rules Collection

Collection of YARA signatures from recent malware research.

44
Visit website
Compare
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

YARA Rules Collection Description

Collection of YARA signatures from recent malware research: - Dacls Trojan Rule: Dacls_Linux.yara - Dacls_Windows.yara - APT32 KerrDown Rule: APT32_KerrDown.yara - ACBackdoor - Linux build Rule: ACBackdoor_Linux.rule - Unnamed Linux Golang Ransomware Rule: Linux_Golang_Ransomware.rule - KPOT v2 Rule: KPOT_v2.yara - WatchBog Linux botnet Rule: WatchBog_Linux.yara - EvilGnome Linux malware Rule: EvilGnome_Linux.yara - APT34 PICKPOCKET Rule: APT34_PICKPOCKET.yara - APT34 LONGWATCH Rule: APT34_LONGWATCH.yara - APT34 VALUEVAULT Rule: APT34_VALUEVAULT.yara

YARA Rules Collection FAQ

Common questions about YARA Rules Collection including features, pricing, alternatives, and user reviews.

YARA Rules Collection is Collection of YARA signatures from recent malware research.. It is a Security Operations solution designed to help security teams with YARA, Signature, Cyber Threat Intelligence.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

Stairwell Logo

File analysis & threat intel search engine for SOC and IR teams.

0
Stairwell Variant Discovery Logo

Expands a single malware hash into full family visibility via structural analysis.

0
Yara Rules Project Logo

A repository of Yara signatures under the GNU-GPLv2 license for the cybersecurity community.

0
YARA-Signatures Logo

A collection of public YARA signatures for various malware families.

0
CDI_yara Logo

A collection of YARA rules for public use, built from intelligence profiles and file work.

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox