Loading...

Looking for alternatives to dnYara? A .Net wrapper library for the native Yara library with interoperability and portability features. Browse 19 similar Security Operations tools below, compare features side-by-side, and find the best fit for your security stack.
Malware analysis platform for SOC teams with binary analysis and threat detection
A Windows context menu integration tool that scans files and folders for malware patterns, crypto signatures, and malicious documents using Yara rules and PEID signatures.
Python 3 tool for parsing Yara rules with ongoing development.
Fnord is a pattern extraction tool that analyzes obfuscated code using sliding window techniques to identify frequent byte sequences and generate experimental YARA rules for malware analysis.
Use FindYara, an IDA python plugin, to scan your binary with yara rules and quickly jump to matches.
A collection of YARA rules specifically designed for forensic investigations and malware analysis, providing pattern matching capabilities for files and memory dumps.
A Python script for scanning data within an IDB using Yara
A tool for processing compiled YARA rules in IDA.
A minimal library to generate YARA rules from JAVA with maven support.
VxSig is a Google-developed tool that automatically generates antivirus byte signatures from similar binaries for Yara and ClamAV detection engines.
YARA module for supporting DCSO format bloom filters with hashlookup capabilities.
Go bindings for YARA with installation and build instructions.
A command-line tool that visually displays YARA rule matches, regex matches, and hex patterns in binary data with colored output and configurable context bytes.
VolatilityBot automates memory dump analysis by extracting executables, detecting code injections, and performing automated malware scanning using YARA and ClamAV.
Generate Yara rules from function basic blocks in x64dbg.
An IDA Pro plugin that uses YARA rules to automatically detect cryptographic constants and patterns in binary files during reverse engineering analysis.
A collection of Yara signatures for identifying malware and other threats
Get strategic cybersecurity insights in your inbox