rules
rules copied to clipboard
Repository of yara rules
more secure
Add rules of hashes of top 200 most used passwords in 2020 as well as rules of hashes of default credentials of various organisations.
This is PR as requested in https://github.com/Yara-Rules/rules/issues/412 (Original authors mentioned, I'm just doing the PR so I can't vouch which variant is better)
PE and ELF Golang detection
SM4 constants according to https://datatracker.ietf.org/doc/html/draft-ribose-cfrg-sm4-10.
# CVE-2022-0847 PoC Rule Date: 2022-03-09 Exploit name: CVE_2022_0847 (a/k/a Dirty Cow 2.0) Reference: [https://haxx.in/files/dirtypipez.c](https://haxx.in/files/dirtypipez.c) Description: Detect local privilege escalation vulnerability Dirty Pipe[z]
Add Ryuk ransomware detection & Update index malware_index.yar
"Armadillo v1.xx - v2.xx" is a false positive https://www.zscaler.com/blogs/research/your-windows-8-packed followup #337, #39
Review and add: https://github.com/Hestat/lw-yara
[PyInstaller](https://github.com/pyinstaller/pyinstaller) is used to freeze and package Python projects, and it is used by thousands of open source projects. Removing the rule helps reduce false positives.