There are 4 repositories under yara-forensics topic.
Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
yara detection rules for hunting with the threathunting-keywords project
Visually inspect and force decode YARA and regex matches found in both binary and text data with colors. Lots of colors.
Set of Yara rules for finding files using magics headers
C# wrapper around the Yara pattern matching library
A script to collect (the most famous) Yara rules from more than 150 free resources. Free alternative to: https://valhalla.nextron-systems.com/
Automatic generation of YARA rules from sample files.
Audit Node Module folder with YARA rules to identify possible malicious packages hiding in node_moudles
Factual rules are YARA rules to find legitimate software on raw disk acquisition.
An ongoing collection of awesome tools and frameworks, best security software practices, libraries, learning tutorials, frameworks, academic and practical resources about YARA in cybersecurity
YARA rules for malware detection
THAMARA - Threat Hunting with AMSI and YARA
A collection of yara rules that can be used for forensics (non malware) cases but also some other rules
Aegis - Flask web interface for scanning files with YARA
🦠 YARA scans, easy & optimized. Full pipeline from fetching latest rules to extracting flagged artifacts for deeper analysis. Windows & GNU/Linux.
A simple wrapper using interop for Yara-X pattern matching on .NET.
The pattern matching swiss knife