YARA signature and IOC database for my scanners and tools
-
Updated
Feb 28, 2025 - YARA
YARA signature and IOC database for my scanners and tools
Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine.
Awesome Security lists for SOC/CERT/CTI
Repository of YARA rules made by Trellix ATR Team
🐺 Malware analysis platform
Extracted Yara rules from Windows Defender mpavbase and mpasbase
Collection of private Yara rules.
yara detection rules for hunting with the threathunting-keywords project
Repository of tools, YARA rules, and code-snippets from Stairwell's research team.
Yara rules written by me, for free use.
IoC Feed for security analysts etc.
Cyber Threat Intelligence Appliance
Yara rules for malicious javascript files from public repositories or written by me.
A collection of yara rules that I created during analysis / for blog posts
This repository contains a list of known YARA rules which researchers can use according to their needs.The repository is opensource and can be used by the end users as long as they follow the GNU GENERAL PUBLIC LICENSE V3.
A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs, Suricata rules, and malware samples to support cybersecurity efforts.
Collection of YARA rules written during my free time outside of work.
Multi-Functional Static Analysis Tool for PE Files
Threat Intelligence & Indicators of Compromise repository.
Add a description, image, and links to the threat-intelligence topic page so that developers can more easily learn about it.
To associate your repository with the threat-intelligence topic, visit your repo's landing page and select "manage topics."