Skip to content
#

vidar-stealer

Here are 3 public repositories matching this topic...

Public catalog of stealer log fingerprints. Banner strings, field signatures, sanitized samples, and YARA rules for 30+ malware families including RedLine, Vidar, Lumma, StealC, and Rhadamanthys. For incident response, detection engineering, and threat intelligence research.

  • Updated May 14, 2026
  • YARA

Improve this page

Add a description, image, and links to the vidar-stealer topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the vidar-stealer topic, visit your repo's landing page and select "manage topics."

Learn more