awesome-yara
awesome-honeypots
Our great sponsors
awesome-yara | awesome-honeypots | |
---|---|---|
7 | 21 | |
3,193 | 7,899 | |
2.8% | - | |
5.6 | 5.9 | |
21 days ago | 5 days ago | |
Python | ||
GNU General Public License v3.0 or later | Artistic License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
awesome-yara
- Incorporating YARA Into Security Processes?
-
Cybersecurity Repositories
YARA
-
YARA Rules for Malware
Check out the myriad of resources available here: https://github.com/InQuest/awesome-yara
-
Identifying packers, crypters or protectors
A signature-based approach with YARA can work to fingerprint the specific software used to obfuscate the malware. A lot of YARA rules for a variety of purposes can be found here, and it might be useful to aggregate ones you care about into your own little detection pipeline.
-
What are the best FOSS YARA rules you would recommend to deploy?
https://github.com/InQuest/awesome-yara#rules
awesome-honeypots
- Wordlists
-
How to make honeypots.
I got to honeypots and there are two tools they mention to implement and use honeypots, dionaea and nepenthes but both are basically abandoned. I tried looking online and I found a "list of honeypots" but this list is also outdated.
You may be interested in https://github.com/paralax/awesome-honeypots
- Intentionally Vulnerable Website
-
Cybersecurity Repositories
Honeypots
-
Using honeypots data to create IOCs collection
Agreed with u/Sloky, if you want catch internal adversaries you may need a lot of tweaking. There are plenty of good lists out there such as this and this and this one
- Honeypot Research Project
-
Is it an bot-farm? Someone/something trying to bruteforce my ssh from same ip region(primarily).
Take a look here: https://github.com/paralax/awesome-honeypots
- Am I a security risk? (Oh and also scaling)
What are some alternatives?
malware-ioc - Indicators of Compromises (IOC) of our various investigations
tpotce - 🍯 T-Pot - The All In One Honeypot Platform 🐝
Awesome-WAF - 🔥 Web-application firewalls (WAFs) from security standpoint.
signature-base - YARA signature and IOC database for my scanners and tools
awesome-malware-analysis - Defund the Police.
yara - The pattern matching swiss knife
audit-node-modules-with-yara - Audit Node Module folder with YARA rules to identify possible malicious packages hiding in node_moudles
DetectionLab - Automate the creation of a lab environment complete with security tooling and logging best practices
API-Security-Checklist - Checklist of the most important security countermeasures when designing, testing, and releasing your API
Detect-It-Easy - Program for determining types of files for Windows, Linux and MacOS.
dvws-node - Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API related vulnerabilities.
rules - Repository of yara rules