The Yara Rules Project is a single repository where different Yara signatures are compiled, classified, and kept up to date under the GNU-GPLv2 license, aiming to provide a comprehensive ruleset for Yara users. Join the community by subscribing to the mailing list or contributing your Yara rules.
FEATURES
ALTERNATIVES
NECOMA focuses on data collection, threat analysis, and developing new cyberdefense mechanisms to protect infrastructure and endpoints.
VX-Underground is a vast online repository of malware samples, featuring various collections for cybersecurity professionals and researchers to analyze and combat cyber threats.
The Trystero Project is a threat intelligence platform that measures email security efficacy and provides various tools and resources, while VMware Carbon Black offers endpoint protection and workload security solutions.
The FASTEST Way to Consume Threat Intelligence and make it actionable.
Cyber Intelligence Management Platform with threat tracking, forensic artifacts, and YARA rule storage.
ONYPHE is a cyber defense search engine that discovers exposed assets and provides real-time monitoring to identify vulnerabilities and potential risks.
A robust Python implementation of TAXII Services with a friendly pythonic API.
A free and open-source OSINT framework for gathering and analyzing data from various sources
PINNED
Fabric Platform by BlackStork
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Mandos Brief Newsletter
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.