Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for yara threat hunting
threat-hunting
x
yara
x
22 search results found
Awesome Yara
⭐
3,095
A curated list of awesome YARA rules, tools, and people.
Signature Base
⭐
2,187
YARA signature and IOC database for my scanners and tools
Yarahunter
⭐
1,225
🔍🔍 Malware scanner for cloud-native, as part of CI/CD and at Runtime 🔍🔍
Ukraine Cyber Operations
⭐
891
Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine.
Threatingestor
⭐
730
Extract and aggregate threat intelligence.
Klara
⭐
630
Kaspersky's GReAT KLara
Threathunting
⭐
495
Tools for hunting for threats.
Yara Rules
⭐
277
Collection of private Yara rules.
Yara Rules
⭐
261
A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.
Gene
⭐
149
Signature engine for all your logs
Detections
⭐
98
This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant yara rules and ids signatures to detect these indicators.
Thiri Notebook
⭐
95
The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat hunting rules.
Judge Jury And Executable
⭐
68
A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power and syntax of SQL.
Wafaray
⭐
49
Enhance your malware detection with WAF + YARA (WAFARAY)
Rpot2
⭐
40
Real-time Packet Observation Tool
Yara Scanner
⭐
34
YaraScanner is a file pattern-matching tool based on YARA rules.
Ioc_signatures
⭐
25
Repository with selected IOCs and YARA rules for threat hunting.
Threathunting Keywords Yara Rules
⭐
17
yara detection rules for hunting with the threathunting-keywords project
Linux Exploit Detection
⭐
16
Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma
Irma
⭐
15
enpoint detection / live analysis & sandbox host / signatures quality test
Iocdata
⭐
11
IoC Feed for security analysts etc.
Yara Rules
⭐
5
This repository contains a list of known YARA rules which researchers can use according to their needs.The repository is opensource and can be used by the end users as long as they follow the GNU GENERAL PUBLIC LICENSE V3.
Plast
⭐
5
Modular command-line threat hunting tool & framework.
Related Searches
Python Yara (213)
Malware Yara (145)
1-22 of 22 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.