YARA Rules Collection Logo

YARA Rules Collection

0
Free
Visit Website

Collection of YARA signatures from recent malware research: - Dacls Trojan Rule: Dacls_Linux.yara - Dacls_Windows.yara - APT32 KerrDown Rule: APT32_KerrDown.yara - ACBackdoor - Linux build Rule: ACBackdoor_Linux.rule - Unnamed Linux Golang Ransomware Rule: Linux_Golang_Ransomware.rule - KPOT v2 Rule: KPOT_v2.yara - WatchBog Linux botnet Rule: WatchBog_Linux.yara - EvilGnome Linux malware Rule: EvilGnome_Linux.yara - APT34 PICKPOCKET Rule: APT34_PICKPOCKET.yara - APT34 LONGWATCH Rule: APT34_LONGWATCH.yara - APT34 VALUEVAULT Rule: APT34_VALUEVAULT.yara

FEATURES

ALTERNATIVES

ONYPHE is a cyber defense search engine that discovers exposed assets and provides real-time monitoring to identify vulnerabilities and potential risks.

A comprehensive and unrestricted dataset of security incidents for research and decision-making

The FASTEST Way to Consume Threat Intelligence and make it actionable.

A tool for quick and effective Yara rule creation to isolate malware families and malicious objects.

A serverless application for creating and monitoring URL tokens with threat intelligence and customizable alerts.

Check if an IP address was used as a Tor relay on a given date.

Deception based detection techniques with MITRE ATT&CK mapping and Honey Resources.

MISP is an open source threat intelligence platform that enhances threat information sharing and analysis.

PINNED