malware-ioc
Indicators of Compromises (IOC) of our various investigations (by eset)
awesome-yara
A curated list of awesome YARA rules, tools, and people. (by InQuest)
Our great sponsors
malware-ioc | awesome-yara | |
---|---|---|
6 | 7 | |
1,492 | 3,193 | |
1.9% | 2.8% | |
7.1 | 5.6 | |
8 days ago | 20 days ago | |
YARA | ||
BSD 2-clause "Simplified" License | GNU General Public License v3.0 or later |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
malware-ioc
Posts with mentions or reviews of malware-ioc.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-08-18.
-
Learning To Learn IT Security
WeLiveSecurity And many more.
-
Historic IOCs from previous APT campaigns
There are some here: https://github.com/eset/malware-ioc
awesome-yara
Posts with mentions or reviews of awesome-yara.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-06-16.
- Incorporating YARA Into Security Processes?
-
Cybersecurity Repositories
YARA
-
YARA Rules for Malware
Check out the myriad of resources available here: https://github.com/InQuest/awesome-yara
-
Identifying packers, crypters or protectors
A signature-based approach with YARA can work to fingerprint the specific software used to obfuscate the malware. A lot of YARA rules for a variety of purposes can be found here, and it might be useful to aggregate ones you care about into your own little detection pipeline.
-
What are the best FOSS YARA rules you would recommend to deploy?
https://github.com/InQuest/awesome-yara#rules
What are some alternatives?
When comparing malware-ioc and awesome-yara you can also consider the following projects:
yara - The pattern matching swiss knife
signature-base - YARA signature and IOC database for my scanners and tools
awesome-malware-analysis - Defund the Police.
intelmq - IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Loki - Loki - Simple IOC and YARA Scanner
audit-node-modules-with-yara - Audit Node Module folder with YARA rules to identify possible malicious packages hiding in node_moudles
Detect-It-Easy - Program for determining types of files for Windows, Linux and MacOS.
reversinglabs-yara-rules - ReversingLabs YARA Rules
rules - Repository of yara rules
Malware-IOCs