There are 5 repositories under yara-rules topic.
A curated list of awesome YARA rules, tools, and people.
YARA signature and IOC database for my scanners and tools
A collection of sources of indicators of compromise.
ReversingLabs YARA Rules
A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.
Collection of private Yara rules.
Signatures and IoCs from public Volexity blog posts.
Personal compilation of APT malware from whitepaper releases, documents and own research
Extracted Yara rules from Windows Defender mpavbase and mpasbase
Django web interface for managing Yara rules
Set of Yara rules for finding files using magics headers
Visually inspect and force decode YARA and regex matches found in both binary and text data. With Colors.
BlackBerry Threat Research & Intelligence
A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power and syntax of SQL.
Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.
yara detection rules for hunting with the threathunting-keywords project
This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports
Unofficial YARA IDA Pro plugin, along with an unparalleled crypto/hash/compression rule set based on Luigi Auriemma's signsrch signatures.
YaraScanner is a file pattern-matching tool based on YARA rules.
Yara scan Phishing Kit's Zip archive(s)
Analysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules
YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.
Collection of YARA signatures from individual research
Scans Slack for API tokens, credentials, passwords, and more using YARA rules