This repository contains YARA rules created after static and dynamic analysis of real malware samples.
These rules are not meant to detect entire malware families, but to identify specific samples with unique patterns or behaviors.
🕵️ “Not generic. Surgical.”
-
📌 Specific Malware Samples
Sharp detection of individual artifacts.
Ideal for forensics, reverse engineering, and precise hunting. -
🛡 Anti-Analysis Techniques (coming soon)
- Anti-Debugging
- Anti-Virtualization
- Anti-Disassembly
- Sandbox Evasion
yara sample123.yara suspicious_file.exeGot a juicy sample? Want to contribute? Open an issue, submit a pull request, or just reach out. This is not about ego — it's about code, detection, and analysis.

