Unverified Commit fd30d015 by jovimon Committed by GitHub

Merge pull request #313 from SavSanta/patch-1

MInor spelling and grammar changges
parents f6d7c090 22ed93e3
......@@ -2,9 +2,9 @@
# Project
This project covers the need of a group of IT Security Researches to have a single repository where different Yara signatures are compiled, classified and kept as up to date as possible, and begin as an open source community for collecting Yara rules. Our Yara ruleset is under the GNU-GPLv2 license and open to any user or organization, as long as you use it under this license.
This project covers the need of a group of IT Security Researchers to have a single repository where different Yara signatures are compiled, classified and kept as up to date as possible, and began as an open source community for collecting Yara rules. Our Yara ruleset is under the GNU-GPLv2 license and open to any user or organization, as long as you use it under this license.
Yara is being increasingly used, but knowledge about the tool and its usage is dispersed in many different places. Yara Rules project aims to be the meeting point for Yara users, gathering together a ruleset as complete as possible thus providing users a quick way to get Yara ready for usage.
Yara is becoming increasingly used, but knowledge about the tool and its usage is dispersed across many different places. The Yara Rules project aims to be the meeting point for Yara users by gathering together a ruleset as complete as possible thusly providing users a quick way to get Yara ready for usage.
We hope this project is useful for the Security Community and all Yara Users, and are looking forward to your feedback. Join this community by subscribing to our mailing list.
......@@ -14,36 +14,35 @@ If you’re interested in sharing your Yara rules with us and the Security Commu
Twitter account: https://twitter.com/yararules
Mail list : http://list.yararules.com/mailman/listinfo/yararules.com.signatures
Mailing list : http://list.yararules.com/mailman/listinfo/yararules.com.signatures
# Requirements
Yara **version 3.0** or higher is required for most of the rules to work. This is mainly due to the use of the "pe" module introduced in that version.
Yara **version 3.0** or higher is required for most of our rules to work. This is mainly due to the use of the "pe" module introduced in that version.
You can check your installed version with `yara -v`
The available packages in Ubuntu 14.04 LTS default repositories are too old. You can install from source or use the packages available in the [Remnux repository](https://launchpad.net/~remnux/+archive/ubuntu/stable).
Packages available in Ubuntu 14.04 LTS default repositories are too old. You can alternatively install from source or use the packages available in the [Remnux repository](https://launchpad.net/~remnux/+archive/ubuntu/stable).
Also, you will need [Androguard Module](https://github.com/Koodous/androguard-yara) if you want to use the rules in mobile_malware category.
Also, you will need [Androguard Module](https://github.com/Koodous/androguard-yara) if you want to use the rules in the 'mobile_malware' category.
# Categories
## Antidebug/AntiVM
## Anti-debug/Anti-VM
In this section you will find Yara Rules aimed to detect anti debug and anti virtualization techniques used by malware to evade automated analyisis.
In this section you will find Yara Rules aimed toward the detection of anti-debug and anti-virtualization techniques used by malware to evade automated analysis.
## CVE_Rules
In this section you will find Yara Rules specialised on the identification of specifics CVE
In this section you will find Yara Rules specialised toward the identification of specific Common Vulnerabilities and Exposures (CVEs)
## Crypto
In this section you will find Yara rules aimed to detect the existence of cryptographic algoritms.
In this section you will find Yara rules aimed toward the detection and existence of cryptographic algorithims.
## Exploit Kits
In this section you will find Yara rules aimed to detect the existence of Exploit Kits.
In this section you will find Yara rules aimed toward the detection and existence of Exploit Kits.
## Malicious Documents
......@@ -51,7 +50,7 @@ In this section you will find Yara Rules to be used with documents to find if th
## Malware
In this section you will find Yara rules specialised on the identification of well-known malware.
In this section you will find Yara rules specialised toward the identification of well-known malware.
## Packers
......@@ -59,17 +58,17 @@ In this section you will find Yara Rules aimed to detect well-known sofware pack
## Webshells
In this section you will find Yara rules specialised on the identification of well-known webshells.
In this section you will find Yara rules specialised toward the identification of well-known webshells.
## Email
In this section you will find Yara rules specialised on the identification of malicious e-mails.
In this section you will find Yara rules specialised toward the identification of malicious e-mails.
## Malware Mobile
In this section you will find Yara rules specialised on the indentification of well-known mobile malware.
In this section you will find Yara rules specialised toward the indentification of well-known mobile malware.
Many rules in this section use Androguard module developed by people at https://koodous.com/.
Many rules in this section use the Androguard module developed by the people over at https://koodous.com/.
You can get it, along with installation instructions, at https://github.com/Koodous/androguard-yara
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment