Set of Yara rules for finding files using magics headers
-
Updated
Sep 8, 2020 - YARA
Set of Yara rules for finding files using magics headers
Audit Node Module folder with YARA rules to identify possible malicious packages hiding in node_moudles
Factual rules are YARA rules to find legitimate software on raw disk acquisition.
C# wrapper around the Yara pattern matching library
An ongoing collection of awesome tools and frameworks, best security software practices, libraries, learning tutorials, frameworks, academic and practical resources about YARA in cybersecurity
A collection of yara rules that can be used for forensics (non malware) cases but also some other rules
YARA rules for malware detection
Aegis - Flask web interface for scanning files with YARA
A script to collect (the most famous) Yara rules from more than 150 free resources. Free alternative to: https://valhalla.nextron-systems.com/
The pattern matching swiss knife
Visually inspect and force decode YARA and regex matches found in both binary and text data. With Colors.
THAMARA - Threat Hunting with AMSI and YARA
Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
Automatic generation of YARA rules from sample files.
yara detection rules for hunting with the threathunting-keywords project
Add a description, image, and links to the yara-forensics topic page so that developers can more easily learn about it.
To associate your repository with the yara-forensics topic, visit your repo's landing page and select "manage topics."