Detection Rules

YARA Rules

Collection of YARA rules for detecting malware families, attack techniques, and suspicious behaviors.

Coming Soon

Additional detection rules and signatures will be added here as they are developed and tested.

Sigma Rules

SIEM detection rules for common attack patterns

Coming Soon

Suricata Rules

Network-based detection signatures

Coming Soon

Custom Signatures

Specialized detection rules for specific threats

Coming Soon