- Home
- Tools
- Security Operations
- Threat Hunting
- YARA Rules Collection
YARA Rules Collection
Collection of YARA signatures from recent malware research.

YARA Rules Collection
Collection of YARA signatures from recent malware research.
YARA Rules Collection Description
Collection of YARA signatures from recent malware research: - Dacls Trojan Rule: Dacls_Linux.yara - Dacls_Windows.yara - APT32 KerrDown Rule: APT32_KerrDown.yara - ACBackdoor - Linux build Rule: ACBackdoor_Linux.rule - Unnamed Linux Golang Ransomware Rule: Linux_Golang_Ransomware.rule - KPOT v2 Rule: KPOT_v2.yara - WatchBog Linux botnet Rule: WatchBog_Linux.yara - EvilGnome Linux malware Rule: EvilGnome_Linux.yara - APT34 PICKPOCKET Rule: APT34_PICKPOCKET.yara - APT34 LONGWATCH Rule: APT34_LONGWATCH.yara - APT34 VALUEVAULT Rule: APT34_VALUEVAULT.yara
YARA Rules Collection FAQ
Common questions about YARA Rules Collection including features, pricing, alternatives, and user reviews.
YARA Rules Collection is Collection of YARA signatures from recent malware research.. It is a Security Operations solution designed to help security teams with YARA, Signature, Cyber Threat Intelligence.