Open-source threat intelligence database for PRX-SD antivirus engine.
This repository aggregates malware signatures, YARA detection rules, and IOC blocklists from multiple free and open-source threat intelligence feeds. It is updated automatically every 6 hours via GitHub Actions.
# Clone the repository
git clone https://github.com/openprx/prx-sd-signatures.git
# Sync all sources (downloads latest signatures)
cd prx-sd-signatures
./sync.sh
# Use with PRX-SD engine
sd import prx-sd-signatures/hashes/sha256/malwarebazaar.txt
sd scan /path/to/fileprx-sd-signatures/
├── hashes/ # Hash-based signatures
│ ├── sha256/ # SHA-256 blocklists (one per source)
│ └── md5/ # MD5 blocklists (VirusShare, --full mode)
│
├── yara/ # YARA detection rules (38,800+ rules)
│ ├── builtin/ # PRX-SD curated rules (MIT licensed)
│ ├── signature-base/ # Neo23x0 APT/crime rules
│ ├── yara-rules/ # Community rules
│ ├── reversinglabs/ # Commercial-grade open-source rules
│ ├── elastic/ # Endpoint protection rules
│ ├── icewater/ # Archived large rule set
│ ├── gcti/ # Google threat intelligence
│ ├── eset/ # APT tracking rules
│ └── inquest/ # Document malware rules
│
├── ioc/ # Indicators of Compromise
│ ├── ip-blocklist.txt # 585K+ malicious IPs (FireHOL + IPsum)
│ ├── domain-blocklist.txt # Malicious domains (SANS + abuse.ch)
│ └── url-blocklist.txt # Malicious URLs (URLhaus + ET)
│
├── clamav/ # ClamAV signature databases (.cvd)
├── feeds/ # Raw threat intelligence feeds
├── sync.sh # Main synchronization script
└── sync.conf # Source configuration
| Source | Type | Update Frequency | License |
|---|---|---|---|
| abuse.ch MalwareBazaar | SHA-256 | Every 5 min | Free |
| abuse.ch URLhaus | SHA-256 | Hourly | Free |
| abuse.ch Feodo Tracker | SHA-256 | Every 5 min | Free |
| abuse.ch ThreatFox | SHA-256 | Continuous | Free |
| abuse.ch SSL Blacklist | SHA-1 | Every 5 min | Free |
| VirusShare | MD5 | Periodic | Free |
| Source | Rules | License | Status |
|---|---|---|---|
| PRX-SD Built-in | 64 | MIT | Active |
| Icewater | 16,432 | Free | Archived |
| Neo23x0/signature-base | ~500 | CC-BY-NC | Active |
| Yara-Rules/rules | ~300 | GPL-2.0 | Active |
| Elastic protections | ~200 | Elastic License | Active |
| ReversingLabs | ~100 | MIT | Active |
| Google GCTI | ~100 | Apache-2.0 | Archived |
| ESET IOC | ~50 | BSD | Active |
| InQuest | ~20 | GPL | Active |
| Source | Type | Content | License |
|---|---|---|---|
| IPsum (aggregated) | IP | 585K+ IPs | Free |
| FireHOL level1 | IP | Aggregated from 400+ feeds | Free |
| Emerging Threats | IP | IDS rule-based | Free |
| SANS ISC | Domain | Daily suspicious domains | Free |
| URLhaus | URL | Malicious URL payloads | Free |
| Source | Signatures | License |
|---|---|---|
| ClamAV Official DB | 11M+ | GPL-2.0 |
All hash blocklists use a unified text format:
# Source: abuse.ch MalwareBazaar
# Updated: 2026-03-17T15:12:07Z
# Count: 550
275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f EICAR.Test.File
ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa Ransom.WannaCry
Format: <hex_hash> <malware_name> (one per line). Lines starting with # are comments.
# Sync all sources
./sync.sh
# Sync specific category
./sync.sh --category hashes
./sync.sh --category yara
./sync.sh --category clamav
./sync.sh --category ioc
# Show statistics
./sync.sh --statsEdit sync.conf to enable/disable individual sources:
# Example: disable VirusShare (very large)
VIRUSSHARE_ENABLED=false
# Example: enable ClamAV sync
CLAMAV_ENABLED=trueGitHub Actions runs sync.sh every 6 hours to keep signatures up to date.
Manual trigger: Actions tab > Sync Signatures > Run workflow.
sd import prx-sd-signatures/hashes/sha256/malwarebazaar.txt
sd import prx-sd-signatures/hashes/sha256/builtin.txtsd import-clamav prx-sd-signatures/clamav/main.cvd prx-sd-signatures/clamav/daily.cvdsd --data-dir ./prx-sd-signatures scan /path/to/filesd update- Place new rules in
yara/builtin/(for PRX-SD curated rules) - Follow standard YARA rule format
- Include metadata:
author,description,date,reference - Test with
yaraoryrCLI before submitting
- Use the unified format:
<hex_hash> <malware_name> - Place in the appropriate
hashes/sha256/orhashes/md5/directory - Include source and date comments at the top
Each source retains its original license. See individual directories for details.
PRX-SD built-in rules (yara/builtin/) are licensed under MIT.
- PRX-SD Engine — The antivirus engine
- OpenPRX — Project homepage