Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
-
Updated
May 19, 2024 - YARA
Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
ReversingLabs YARA Rules
Collection of private Yara rules.
Yara Ruleset for scanning Linux servers for shells, spamming, phishing and other webserver baddies
A Malware classifier dataset built with header fields’ values of Portable Executable files
Notes and IoCs of fresh malware
This tool maps a file's behavior on MITRE ATT&CK matrix.
Collection of YARA signatures from individual research
Malice Yara Plugin
Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"
some of my IOCs from malware investigations
Welcome to the Pressidium® Yara Rules repository. This section contains a carefully curated collection of Yara rules specifically designed to detect and prevent WordPress or PHP malware and viruses, ensuring a safer online environment.
YARA rules for malware detection
windows apps analysis toolkit
The collection of YARA rules to perform malware threat hunting and detection.
This repository contains my own simple `Yara-rules` to check specified binaries to categorize it by malware types.
Add a description, image, and links to the malware-detection topic page so that developers can more easily learn about it.
To associate your repository with the malware-detection topic, visit your repo's landing page and select "manage topics."