performing-threat-hunting-with-yara-rules
mukul975/Anthropic-Cybersecurity-Skills
Leverage YARA pattern-matching rules to scan files, directories, and memory dumps for malware families, suspicious patterns, and IOCs, including rule authoring, yara-python scanning, and threat intel integrations.