Skip to content

This repository contains YARA rules created after static and dynamic analysis of real malware samples.

License

Notifications You must be signed in to change notification settings

5kidRo0t/YARA_Rules

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

⚠️ YARA Rules by 5kidRo0t ⚠️

Malware


🧠 Repository Philosophy

This repository contains YARA rules created after static and dynamic analysis of real malware samples.
These rules are not meant to detect entire malware families, but to identify specific samples with unique patterns or behaviors.

🕵️ “Not generic. Surgical.”


💣 Rule Types Included

  • 📌 Specific Malware Samples
    Sharp detection of individual artifacts.
    Ideal for forensics, reverse engineering, and precise hunting.

  • 🛡 Anti-Analysis Techniques (coming soon)

    • Anti-Debugging
    • Anti-Virtualization
    • Anti-Disassembly
    • Sandbox Evasion

🚀 Quick Usage

yara sample123.yara suspicious_file.exe

🤝 Collaboration

Got a juicy sample? Want to contribute? Open an issue, submit a pull request, or just reach out. This is not about ego — it's about code, detection, and analysis.

Malware

About

This repository contains YARA rules created after static and dynamic analysis of real malware samples.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages