Git Product home page Git Product logo

awesome-yara's Introduction

Awesome YARA Awesome

A curated list of awesome YARA rules, tools, and resources. Inspired by awesome-python and awesome-php.

YARA is an ancronym for: YARA: Another Recursive Ancronym, or Yet Another Ridiculous Acronym. Pick your choice.

-- Victor M. Alvarez (@plusvic)

YARA, the "pattern matching swiss knife for malware researchers (and everyone else)" is developed by @plusvic and @VirusTotal. View it on GitHub.

Contents

Legend

  • ๐Ÿ‘€ - Actively maintained, a repository worth watching.
  • ๐Ÿ’Ž - Novel, interesting, educational, or otherwise stand-out content.
  • โœจ - Recently released, shiny new toys.
  • ๐Ÿ† - The biggest collection award, awarded to a single repo.

Rules

  • AlienVault Labs Rules
    • A collection of tools, signatures, and rules from the researchers at AlienVault Labs. Search the repo for .yar and .yara extensions to find about two dozen rules ranging from APT detection to generic sandbox / VM detection. Last updated in January of 2016.
  • Apple OSX
    • Apple has ~40 YARA signatures for detecting malware on OSX. The file, XProtect.yara, is available locally at /System/Library/CoreServices/XProtect.bundle/Contents/Resources/.
  • BinaryAlert YARA Rules ๐Ÿ‘€ โœจ
    • A couple dozen rules written and released by AirBnB as part of their BinaryAlert tool (see next section). Detection for hack tools, malware, and ransomware across Linux, Window, and OS X. This is a new and active project.
  • Burp YARA Rules
    • A collection of YARA rules intended to be used with the Burp Proxy through the Yara-Scanner extension. These rules focus mostly on non-exe malware typically delivered over HTTP including HTML, Java, Flash, Office, PDF, etc. Last updated in June of 2016.
  • Brian Carter Rules โœจ
    • A collection of personal rules written by Brian Carter, mostly designed for VirusTotal hunting.
  • CAPE Rules ๐Ÿ‘€
    • Rules from various authors bundled with the Config And Payload Extraction Cuckoo Sandbox extension (see next section).
  • CDI Rules โœจ
    • A collection of YARA rules released by CyberDefenses for public use. Built from information in intelligence profiles, dossiers and file work.
  • Citizen Lab Malware Signatures
    • YARA signatures developed by Citizen Lab. Dozens of signatures covering a variety of malware families. The also inclde a syntax file for Vim. Last update was in November of 2016.
  • Didier Stevens Rules ๐Ÿ’Ž
    • A collection of rules from Didier Stevens, author of a suite of tools for inspecting OLE/RTF/PDF. Didier's rules are worth scrutinizing and are generally written purposed towards hunting. New rules are frequently announced through the NVISO Labs Blog.
  • ESET IOCs ๐Ÿ‘€
    • A collection of YARA and Snort rules from IOCs collected by ESET researchers. There's about a dozen YARA Rules to glean from in this repo, search for file extension .yar. This repository is seemingly updated on a roughly monthly interval. New IOCs are often mentioned on the ESET WeLiveSecurity Blog.
  • Fidelis Rules
    • You can find a half dozen YARA rules in Fidelis Cyber's IOC repository. They update this repository on a roughly quarterly interval. Complete blog content is also available in this repository.
  • Florian Roth Rules ๐Ÿ‘€ ๐Ÿ’Ž
    • Florian Roth's signature base is a frequently updated collection of IOCs and YARA rules that cover a wide range of threats. There are dozens of rules which are actively maintained. Watch the repository to see rules evolve over time to address false potives / negatives.
  • FSF Rules
    • Mostly filetype detection rules, from the EmersonElectricCo FSF project (see next section).
  • GoDaddy ProcFilter Rules
    • A couple dozen rules written and released by GoDaddy for use with ProcFilter (see next section). Example rules include detection for packers, mimikatz, and specific malware.
  • h3x2b Rules ๐Ÿ’Ž
    • A collection of signatures from h3x2b which stand out in that they are generic and can be used to assist in reverse engineering. There are YARA rules for identifying crypto routines, highly entropic sections (certificate discovery for example), discovering injection / hooking functionality, and more.
  • Icewater Rules
    • A repository of automatically generated YARA rules from Icewater.io. This repository is updated rapidly with newly generated signatures that mostly match on file size range and partial content hashes.
  • InQuest Rules ๐Ÿ‘€
    • YARA rules published by InQuest researchers mostly geared towards threat hunting on Virus Total. Rules are updated as new samples are collected and novel pivots are discovered. The InQuest Blog will often discuss new findings.
  • kevthehermit Rules
    • Dozens of rules from the personal collection of Kevin Breen. This repository hasn't been updated since February of 2016.
  • NCC Group Rules ๐Ÿ‘€
    • A handful of YARA rules released by NCC Group's Cyber Defence team.
  • Malice.IO YARA Plugin Rules ๐Ÿ‘€
    • A collection of topical from a variety of sources for the YARA component of the Malice.IO framework.
  • mikesxrs YARA Rules Collection ๐Ÿ‘€ ๐Ÿ†
    • Large collection of open source rules aggregated from a variety of sources, including blogs and other more ephemeral sources. Over 100 categories, 1500 files, 4000 rules, and 20Mb. If you're going to pull down a single repo to play with, this is the one.
  • Patrick Olsen Rules ๐Ÿ’Ž
    • A small collection of rules with a wide footprint for variety in detection. RATs, documents, PCAPs, executables, in-memory, point-of-sale malware, and more. Unfortunately this repository hasn't seen an update since late 2014.
  • QuickSand Lite Rules
    • This repo contains a C framework and standalone tool for malware analysis, along with several useful YARA rules developed for use with the project.
  • SpiderLabs Rules
    • A repository of tools and scripts related to malware analysis from the researchers at SpiderLabs. There's only three YARA rules here and the last update was back in 2015, but worth exploring.
  • Tenable Rules
    • Small collection from Tenable Network Security.
  • VectraThreatLab Rules
    • YARA rules for identifying anti-RE malware techniques.
  • x64dbg Signatures
    • A few signatures to possibly be included in x64dbg.
  • YARA-FORENSICS
    • A collection of file type identfiying rules.
  • YaraRules Project Official Repo ๐Ÿ‘€
    • Large collection of rules constantly updated by the community.

Tools

  • AirBnB BinaryAlert
    • Open-source serverless AWS pipeline where any file uploaded to an S3 bucket is immediately scanned with a configurable set of YARA rules.
  • CAPE: Config And Payload Extraction ๐Ÿ‘€
    • CAPE is an extension of Cuckoo specifically designed to extract payloads and configuration from malware. CAPE can detect a number of malware techniques or behaviours, as well as specific malware families, from its initial run on a sample. This detection then triggers a second run with a specific package, in order to extract the malware payload and possibly its configuration, for further analysis.
  • ELAT
    • Event Log Analysis Tool that creates/uses YARA rules for Windows event log analysis.
  • Emerson File Scanning Framework (FSF)
    • Modular, recursive file scanning solution.
  • findcrypt-yara
    • IDA pro plugin to find crypto constants (and more).
  • GoDaddy ProcFilter ๐Ÿ’Ž
    • ProcFilter is a process filtering system for Windows with built-in YARA integration. YARA rules can be instrumented with custom meta tags that tailor its response to rule matches. It runs as a Windows service and is integrated with Microsoft's ETW API, making results viewable in the Windows Event Log. Installation, activation, and removal can be done dynamically and does not require a reboot.
  • InQuest ThreatKB
    • Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL).
  • Laika BOSS
    • Object scanner and intrusion detection system that strives to achieve the following goals: Scalable, Flexible, Verbose.
    • Whitepaper
  • Loki
    • Simple IOC and YARA rule scanner.
  • Malice
    • An open source VirusTotal alternative, with YARA support.
  • MITRE MultiScanner
    • File analysis framework that assists the user in evaluating a set of files by automatically running a suite of tools for the user and aggregating the output.
  • OCYara
    • Performs OCR on image files and scans them for matches to YARA rules.
  • PasteHunter
    • Scan pastebin.com with YARA rules.
  • QuickSand.io
    • Compact C framework to analyze suspected malware documents. Also includes a web interface and online analysis.
  • stoQ
    • Modular and highly customizable framework for the creation of data sets from multiple disparate data sources.
  • yabin
    • Creates YARA signatures from executable code within malware.
  • YaraGenerator
    • Quick, simple, and effective yara rule creation to isolate malware families and other malicious objects of interest.
  • YaraGuardian
    • Django web inerface for managing YARA rules.
  • yaraMail
    • YARA scanner for IMAP feeds and saved streams.
  • YaraManager
    • Web based manager for YARA rules.
  • yarAnalyzer
    • YARA rule set coverage analyzer.
  • yaraPCAP
    • YARA scanner For IMAP feeds and saved streams.
  • Yara Python ICAP Server
    • ICAP server with YARA scanner.
  • Yara-Scanner
    • Python-based extension that integrates a YARA scanner into Burp Suite.
  • Yara-Validator
    • Validates YARA rules and tries to repair the broken ones.
  • yarGen
    • YARA rule generator for finding related samples and hunting.
  • Yeti
    • Platform meant to organize observables, indicators of compromise, TTPs, and knowledge on threats in a single, unified repository.
  • yextend
    • YARA integrated software to handle archive file data.

Services

  • MalShare
    • Free malware repository providing researchers access to samples, malicous feeds, and YARA results.
  • YaraEditor (Web)
    • All-in-one website to create and manage YARA rules.
  • YaraRules Analyzer
    • Upload and run files against rulesets from the YaraRules Project.

People

We're aggregating the Twitter handles for anyone involved with the projects on this page into a single list: awesome-yara Twitter list. Do let us know if anyone is missing.

Related Awesome Lists

Contributing

Pull requests and issues with suggestions are welcome! Please try to keep your changes cleanly formatted and alphabetized. By submitting a PR you agree to release your contributions under the terms of the LICENSE.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.