All Projects → Yara-Rules → Rules

Yara-Rules / Rules

Licence: gpl-2.0
Repository of yara rules

Programming Languages

YARA
70 projects

Projects that are alternatives of or similar to Rules

Signature Base
Signature base for my scanner tools
Stars: ✭ 1,212 (-57.35%)
Mutual labels:  yara
Yaraguardian
Django web interface for managing Yara rules
Stars: ✭ 156 (-94.51%)
Mutual labels:  yara
Malware Indicators
Citizen Lab Malware Reports
Stars: ✭ 196 (-93.1%)
Mutual labels:  yara
Awesome Yara
A curated list of awesome YARA rules, tools, and people.
Stars: ✭ 1,394 (-50.95%)
Mutual labels:  yara
Iocs
Sophos-originated indicators-of-compromise from published reports
Stars: ✭ 128 (-95.5%)
Mutual labels:  yara
Dailyioc
IOC from articles, tweets for archives
Stars: ✭ 167 (-94.12%)
Mutual labels:  yara
Yara Endpoint
Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.
Stars: ✭ 75 (-97.36%)
Mutual labels:  yara
Red team tool countermeasures
No description, website, or topics provided.
Stars: ✭ 2,479 (-12.77%)
Mutual labels:  yara
Threathunting
Tools for hunting for threats.
Stars: ✭ 153 (-94.62%)
Mutual labels:  yara
Go Yara
Go bindings for YARA
Stars: ✭ 198 (-93.03%)
Mutual labels:  yara
Analyzer
🔍 Offline Analyzer for extracting features, artifacts and IoCs from Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more
Stars: ✭ 108 (-96.2%)
Mutual labels:  yara
Walkoff Apps
WALKOFF-enabled applications. #nsacyber
Stars: ✭ 125 (-95.6%)
Mutual labels:  yara
Apt cybercriminal campagin collections
APT & CyberCriminal Campaign Collection
Stars: ✭ 2,572 (-9.5%)
Mutual labels:  yara
Php Malware Finder
Detect potentially malicious PHP files
Stars: ✭ 1,245 (-56.19%)
Mutual labels:  yara
Yara Rules
A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.
Stars: ✭ 206 (-92.75%)
Mutual labels:  yara
Lw Yara
Yara Ruleset for scanning Linux servers for shells, spamming, phishing and other webserver baddies
Stars: ✭ 78 (-97.26%)
Mutual labels:  yara
Loki
Loki - Simple IOC and Incident Response Scanner
Stars: ✭ 2,217 (-21.99%)
Mutual labels:  yara
Fsf
File Scanning Framework
Stars: ✭ 228 (-91.98%)
Mutual labels:  yara
Yextend
Yara integrated software to handle archive file data.
Stars: ✭ 207 (-92.72%)
Mutual labels:  yara
Open Source Yara Rules
YARA Rules I come across on the internet
Stars: ✭ 195 (-93.14%)
Mutual labels:  yara

Build Status

Project

This project covers the need of a group of IT Security Researchers to have a single repository where different Yara signatures are compiled, classified and kept as up to date as possible, and began as an open source community for collecting Yara rules. Our Yara ruleset is under the GNU-GPLv2 license and open to any user or organization, as long as you use it under this license.

Yara is becoming increasingly used, but knowledge about the tool and its usage is dispersed across many different places. The Yara Rules project aims to be the meeting point for Yara users by gathering together a ruleset as complete as possible thusly providing users a quick way to get Yara ready for usage.

We hope this project is useful for the Security Community and all Yara Users, and are looking forward to your feedback. Join this community by subscribing to our mailing list.

Contribute

If you’re interested in sharing your Yara rules with us and the Security Community, you can join our mailing list, send a message to our Twitter account or send a pull request here.

Twitter account: https://twitter.com/yararules

Requirements

Yara version 3.0 or higher is required for most of our rules to work. This is mainly due to the use of the "pe" module introduced in that version.

You can check your installed version with yara -v

Packages available in Ubuntu 14.04 LTS default repositories are too old. You can alternatively install from source or use the packages available in the Remnux repository.

Also, you will need Androguard Module if you want to use the rules in the 'mobile_malware' category.

We have deprecated mobile_malware rules that depend on Androguard Module because it seems an abandoned project.

Categories

Anti-debug/Anti-VM

In this section you will find Yara Rules aimed toward the detection of anti-debug and anti-virtualization techniques used by malware to evade automated analysis.

Capabilities

In this section you will find Yara rules to detect capabilities that do not fit into any of the other categories. They are useful to know for analysis but may not be malicious indicators on their own.

CVE Rules

In this section you will find Yara Rules specialised toward the identification of specific Common Vulnerabilities and Exposures (CVEs)

Crypto

In this section you will find Yara rules aimed toward the detection and existence of cryptographic algorithms.

Exploit Kits

In this section you will find Yara rules aimed toward the detection and existence of Exploit Kits.

Malicious Documents

In this section you will find Yara Rules to be used with documents to find if they have been crafted to leverage malicious code.

Malware

In this section you will find Yara rules specialised toward the identification of well-known malware.

Packers

In this section you will find Yara Rules aimed to detect well-known software packers, that can be used by malware to hide itself.

WebShells

In this section you will find Yara rules specialised toward the identification of well-known webshells.

Email

In this section you will find Yara rules specialised toward the identification of malicious e-mails.

Malware Mobile

In this section you will find Yara rules specialised toward the identification of well-known mobile malware.

Deprecated

In this section you will find Yara rules deprecated.

Contact

Webpage: https://yara-rules.github.io/blog/

Twitter account: https://twitter.com/yararules

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].