Access to the database is free and it is community-centric.
We document all techniques with a piece of code that can be used to strengthen your security.
Improve your threat research and malware analysis with our Yara Rules.
Understand how malware bypasses your in-place security and how to harden your system.
The database aims to provide the most detailed information on evasion techniques. Anyone can participate and will be credited on the project page.
Understanding evasion techniques is easier when you have the source code to understand how it works.
Yara rules are essential for threat hunting and malware analysis. We aim to provide yara rules for each technique reported in the database.