ReversingLabs YARA Rules
-
Updated
Nov 27, 2024 - YARA
ReversingLabs YARA Rules
Self-made YARA rules for malware research, detection, and analysis.
Welcome to Morpheus, formerly known as Ransomsniffer, your gateway to advanced IOC detection. This enhanced tool leverages expertly crafted YARA rules to meticulously scan and identify Indicators of Compromise across diverse files and formats. Embrace a new era of cybersecurity defense, where innovation meets unmatched precision.
This is a gui script that takes a pe file and creates a yara file to detect it
yara detection rules for hunting with the threathunting-keywords project
Signatures and IoCs from public Volexity blog posts.
RansomPyShield is a Tool to detect and stop Ransomware with Honeypot Technique , Yara Rules , and other stuff using Python
This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports
YARA signature and IOC database for my scanners and tools
Collection of private Yara rules.
A curated list of awesome YARA rules, tools, and people.
Extracted Yara rules from Windows Defender mpavbase and mpasbase
Утилита для работы с файловым хранилищем S3 и сканирования набором YARA-правил
Resources from Trend Micro Research teams
Awesome list of keywords and artifacts for Threat Hunting sessions
This lab is design to installation and configuration of YARA in linux machine. also we will see how we can create rules for malware or threat detection with realworld examples.
Add a description, image, and links to the yara-rules topic page so that developers can more easily learn about it.
To associate your repository with the yara-rules topic, visit your repo's landing page and select "manage topics."