awesome-yara
awesome-hacking
awesome-yara | awesome-hacking | |
---|---|---|
7 | 1 | |
3,265 | 12,107 | |
1.9% | - | |
7.1 | 3.0 | |
about 1 month ago | about 2 months ago | |
GNU General Public License v3.0 or later | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
awesome-yara
- XSOAR Yara Feeds
- Incorporating YARA Into Security Processes?
-
Cybersecurity Repositories
YARA
-
YARA Rules for Malware
Check out the myriad of resources available here: https://github.com/InQuest/awesome-yara
-
Identifying packers, crypters or protectors
A signature-based approach with YARA can work to fingerprint the specific software used to obfuscate the malware. A lot of YARA rules for a variety of purposes can be found here, and it might be useful to aggregate ones you care about into your own little detection pipeline.
-
What are the best FOSS YARA rules you would recommend to deploy?
https://github.com/InQuest/awesome-yara#rules
- InQuest/awesome-yara - A curated list of awesome YARA rules, tools, and people.
awesome-hacking
-
Cybersecurity Repositories
Hacking
What are some alternatives?
malware-ioc - Indicators of Compromises (IOC) of our various investigations
API-Security-Checklist - Checklist of the most important security countermeasures when designing, testing, and releasing your API
signature-base - YARA signature and IOC database for my scanners and tools
Probable-Wordlists - Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren't popular!
awesome-malware-analysis - Defund the Police.
Awesome Cryptography - A curated list of cryptography resources and links.
yara - The pattern matching swiss knife
awesome-ml-for-cybersecurity - :octocat: Machine Learning for Cyber Security
audit-node-modules-with-yara - Audit Node Module folder with YARA rules to identify possible malicious packages hiding in node_moudles
SecLists - SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
Detect-It-Easy - Program for determining types of files for Windows, Linux and MacOS.
vulhub - Pre-Built Vulnerable Environments Based on Docker-Compose