Search Results for: yara
Premade YARA rules for hunting
If you’re on the hunt for YARA rules, let me be your guide to some invaluable resources. The directories I’ve rounded up for you here [more…]
Hunting Phishing kits and Phishing Pages with YARA
If you are a cybersecurity enthusiast, then you must have heard of YARA. It’s a powerful tool, a veritable magnet for digital threats. Today, we [more…]
The YARA User Guide: How to Install and Scan for .onion Strings
The power of YARA is undisputed in the world of cybersecurity, proving to be an essential tool for hunting malware. Here’s a quick guide on [more…]
Guide: YARA Detection for Sliced Strings
YARA shines as an invaluable tool. Yet, it lacks direct support for detecting split strings across different addresses in a binary file. This guide outlines [more…]
YARA Rules 101: Quickly craft YARA rules
YARA is like a Swiss Army knife for cybersecurity. It’s a powerful tool used for malware detection and classification. This allows cyber defenders to identify, [more…]
Create YARA rule
The YARA Signature Generator is a powerful tool designed to simplify the process of creating YARA signatures for malware detection. Benefits String Management: The tool [more…]
The Role of Automated Analysis and Triage in Cybersecurity
Big volumes of security threats make it challenging to pinpoint which incidents need immediate attention. Automated analysis and triage systems in the realm of threat [more…]
The Best Cybersecurity Tools (2023)
Get the best cybersecurity tools across six categories that matter most to cyber professionals: Pentesting, DFIR, Vulnerability Assessments, Detection and Response, Proof of Concepts, and [more…]
Top 25 Open Source Cyber Security Tools
Open-source cybersecurity tools are vital in combating digital threats. To keep you ahead in this rapidly evolving domain, we’ve curated a comprehensive list of the [more…]