#
yara
Here are 213 public repositories matching this topic...
A curated list of awesome YARA rules, tools, and people.
ioc
awesome
awesome-list
threat-hunting
malware-analysis
malware-research
yara
yara-rules
malware-detection
yara-manager
yara-signatures
malware-rules
yara-scanner
awesome-yara
-
Updated
Apr 23, 2022
Signature base for my scanner tools
-
Updated
Apr 15, 2022 - YARA
Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
android
machine-learning
antivirus
malware-analysis
malware-research
yara
packers
malware-detection
rasp
yara-forensics
android-protect-apps
android-protection
appshielding
-
Updated
Apr 21, 2022 - YARA
BinaryAlert: Serverless, Real-time & Retroactive Malware Detection.
-
Updated
Mar 4, 2022 - Python
DIE engine
entropy
reverse-engineering
signature
disassembler
elf
binary-analysis
program-analysis
hacktoberfest
yara
unpacker
hacktoberfest2021
-
Updated
Apr 23, 2022 - C++
yarGen is a generator for YARA rules
-
Updated
Feb 12, 2022 - Python
Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine.
-
Updated
Apr 23, 2022 - YARA
Extract and aggregate threat intelligence.
ioc
osint
dfir
threat-hunting
malware-research
misp
threat-sharing
threatintel
yara
threat-analysis
fraud-detection
intelligence-gathering
security-tools
threat-intelligence
soar
indicators-of-compromise
threat-feeds
threat-intelligence-platform
-
Updated
Apr 19, 2022 - Python
Modular file scanning/analysis framework
python
linux
metadata
malware
python-script
antivirus
malware-analyzer
malware-analysis
malware-research
scanning
cuckoo
analytic-machines
analysis-framework
mount-point
yara
-
Updated
Oct 8, 2019 - Python
ReversingLabs YARA Rules
reverse-engineering
yara
yara-rules
ransomware-prevention
malware-detection
ransomware-detection
indicators-of-compromise
yara-signatures
-
Updated
Apr 21, 2022 - YARA
Repository of YARA rules made by Trellix ATR Team
-
Updated
Feb 24, 2022 - YARA
An open source framework for enterprise level automated analysis.
framework
malware-analyzer
malware-analysis
malware-research
automation-framework
yara
security-automation
malware-detection
-
Updated
Feb 23, 2022 - Python
Defanged Indicator of Compromise (IOC) Extractor.
ioc
library
osint
base64
decoding
dfir
malware-research
threat-sharing
threatintel
yara
threat-intelligence
defang
indicators-of-compromise
ioc-extractor
-
Updated
Jun 3, 2021 - Python
docker
flask
static-analysis
reverse-engineering
malware
self-hosted
python3
malware-analysis
binary-analysis
self-hosting
malware-research
hacktoberfest
yara
virustotal
self-hosted-api
threat-intelligence
-
Updated
Jan 24, 2022 - YARA
msm-code
commented
Dec 30, 2021
After #259 there is a hardcoded max-width of a field in the config entries list. There is probably a better way to do it with flexbox. It should be refactored
Originally posted by @nazywam in CERT-Polska/mquery#259 (comment)
A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.
-
Updated
Feb 11, 2022 - Python
File Scanning Framework
-
Updated
Sep 15, 2021 - Python
A Binary Genetic Traits Lexer Framework
machine-learning
genetic-algorithm
reverse-engineering
malware
genetic-programming
malware-analysis
malware-research
yara
-
Updated
Apr 24, 2022 - C++
Django web interface for managing Yara rules
rules
database
manager
metrics
corpus
registration
yara
yara-rules
guest-registration
yara-manager
yara-metrics
-
Updated
Jul 28, 2018 - Python
Collection of private Yara rules.
threat-hunting
yara
yara-rules
threat-intelligence
malware-detection
ransomware-detection
yara-signatures
-
Updated
Apr 12, 2022 - YARA
Improve this page
Add a description, image, and links to the yara topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the yara topic, visit your repo's landing page and select "manage topics."


Currently, we're not detecting a lot of @wireghoul's htaceess-based webshells. It would be nice to improve the situation :)