LokiLoki - Simple IOC and Incident Response Scanner
yarasploitYaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.
static file analysisAnalysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules
ThreatKBKnowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)
rtfsigA tool to help malware analysts signature unique parts of RTF documents
factual-rules-generatorFactual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.
HyaraYara rule making tool (IDA Pro & Binary Ninja & Cutter Plugin)
YaraStationYara station is a management portal for Neo23x0-Loki. The mission is to transform the standalone nature of the Loki scanner into a centralized management solution that facilitates result investigation and easier scanning capabilities.
yara-validatorValidates yara rules and tries to repair the broken ones.
yara-forensicsSet of Yara rules for finding files using magics headers
threat-intelSignatures and IoCs from public Volexity blog posts.
Judge-Jury-and-ExecutableA file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power and syntax of SQL.
PEiDYet another implementation of PEiD with yara