Skip to content

Neo23x0/god-mode-rules

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 

Repository files navigation

God Mode Rules

Welcome to the God Mode Security Rules Repository! This repository is dedicated to hosting very specific threat deteczion rules. The primary focus of these "god mode" rules is to serve as a proof-of-concept for a special purpose: crafting a single rule that covers as many threats as possible while minimizing false positives. My meticulously crafted rules provide broad coverage against a wide range of cyber threats, including malware, ransomware, advanced persistent threats (APTs), and more.

Contents

Currently, the repository hosts the following rules:

IDDQD_Godmode_YARA_Rule: A YARA rule designed for extensive threat detection across various cyber attack vectors.

Author: Florian Roth Date Created: 2019-05-15 Last Modified: 2023-12-23

Upcoming Addition:

Sigma Rule: I am in the process of adding a similar Sigma rule.

Usage

To use these rules:

  • Clone the repository to your local machine
  • Integrate the rules into your security platforms or use them with compatible tools (e.g., YARA for scanning and Sigma for SIEM systems)
  • Customize the rules as per your specific environment and threat landscape (e.g. filter false positives)

License

MIT

Contact

For any queries or discussions, please open an issue in this repository, or contact me here.

About

God Mode Detection Rules

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Languages