This repository contains a list of known YARA rules which researchers can use according to their needs.The repository is opensource and can be used by the end users as long as they follow the GNU GENERAL PUBLIC LICENSE V3.
YARA is a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families (or whatever you want to describe) based on textual or binary patterns. Each description, a.k.a. rule, consists of a set of strings and a boolean expression which determine its logic.
You can check these links if you are new to YARA and want to learn more about it:
Writing Your Own YARA Rule: https://yara.readthedocs.io/en/v3.4.0/writingrules.html
Running YARA From Command Line: https://yara.readthedocs.io/en/v3.4.0/commandline.html
Using YARA For Malware Detection: https://us-cert.cisa.gov/sites/default/files/FactSheets/NCCIC%20ICS_FactSheet_YARA_S508C.pdf
Detecting-Malicious-Files-With-YARA-Rules-As-They-Traverse-the-Network: https://i.blackhat.com/USA-19/Wednesday/us-19-Bernal-Detecting-Malicious-Files-With-YARA-Rules-As-They-Traverse-the-Network-wp.pdf
Writing Effective YARA Signatures to Identify Malware: https://insights.sei.cmu.edu/sei_blog/2012/11/writing-effective-yara-signatures-to-identify-malware.html
Signature-Based Detection With YARA : https://securityintelligence.com/signature-based-detection-with-yara/
Latest YARA documentation : http://yara.readthedocs.io/en/latest/
YARA: Simple and Effective Way of Dissecting Malware : http://resources.infosecinstitute.com/yara-simple-effective-way-dissecting-malware/
I totally look forward for some contribution from other users to this repository.In order to contribute the user can create a pull request with the content they would like to add.
Twitter: https://twitter.com/0x9747/ Instagram: https://instagam.com/umairnehri9747/