YARA signature and IOC database for my scanners and tools
-
Updated
Aug 7, 2025 - YARA
YARA signature and IOC database for my scanners and tools
Awesome Security lists for SOC/CERT/CTI
Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine.
Repository of YARA rules made by Trellix ATR Team
Collection of private Yara rules.
yara detection rules for hunting with the threathunting-keywords project
Repository of tools, YARA rules, and code-snippets from Stairwell's research team.
A curated collection of YARA rules and structured JSON reports designed to identify and analyze various malware builder variants, for educational and research purposes only.
IoC Feed for security analysts etc.
A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs, Suricata rules, and malware samples to support cybersecurity efforts.
This repository contains a list of known YARA rules which researchers can use according to their needs.The repository is opensource and can be used by the end users as long as they follow the GNU GENERAL PUBLIC LICENSE V3.
Open-Source and Free EDR with Active Response Features for Small and Medium Enterprises
Multi-Functional Static Analysis Tool for PE Files
YARA signature | YARA rule for Detecting Voldemort Malware
YARA rules to map ATT&CK TT on OSX malware
This repository contains a collection of threat hunting rules.
Some shared yara rules
Add a description, image, and links to the threat-hunting topic page so that developers can more easily learn about it.
To associate your repository with the threat-hunting topic, visit your repo's landing page and select "manage topics."