performing-threat-hunting-with-yara-rules
mukul975/Anthropic-Cybersecurity-Skills
Use YARA pattern-matching rules to hunt malware, scan files, directories, and memory dumps, integrate with threat intelligence feeds, author detection rules, and automate batch triage and IOC validation workflows.