📔
Defense
search
⌘Ctrlk
📔
Defense
  • Defense
  • Getting Started
    • Introductory Networking
    • Network Services
    • Network Services 2
    • Wireshark 101
    • !Intro to Windows
    • Active Directory Basics
    • !Windows Core Processes
    • !SysInternals
  • Threat and Vulnerability Management
    • !Nessus
    • MITRE
    • Yara
      • Introduction
      • What is Yara?
      • Installing Yara (Ubuntu/Debian & Windows)
      • Deploy
      • Introduction to Yara Rules
      • Expanding on Yara Rules
      • Yara Modules
      • Other Tools and Yara
      • Using LOKI and its Yara rule set
      • Creating Yara rules with yarGen
      • Valhalla
      • Conclusion
    • Intro to ISAC
    • Zero Logon
    • !OpenVAS
    • !MISP
  • Security Operations and Monitoring
    • Splunk
    • Windows Event Logs
    • Sysmon
    • Suricata
    • Osquery
    • Graylog
    • OpenEDR
  • Threat Emulation
    • Attacktive Directory
    • Attacking Kerberos
    • Atomic Red Team
  • Incident Response and Forensics
    • Volatility
    • Forensics
    • Investigating Windows
    • Windows Forensics
    • Redline
    • Autopsy
  • Malware Analysis and Reverse Engineering
    • History of Malware
    • Malware Introductory
    • Researching
    • Strings
    • Basic Malware RE
    • REMnux: The Redux
    • Reversing .NET Apps
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Threat and Vulnerability Management

Yara

Introductionchevron-rightWhat is Yara?chevron-rightInstalling Yara (Ubuntu/Debian & Windows)chevron-rightDeploychevron-rightIntroduction to Yara Ruleschevron-rightExpanding on Yara Ruleschevron-rightYara Moduleschevron-rightOther Tools and Yarachevron-rightUsing LOKI and its Yara rule setchevron-rightCreating Yara rules with yarGenchevron-rightValhallachevron-rightConclusionchevron-right
PreviousConclusionchevron-leftNextIntroductionchevron-right

Last updated 5 years ago