Loading...

Looking for alternatives to ocaml-yara? An OCaml Ctypes wrapper for the YARA matching engine that enables malware identification capabilities in OCaml applications. Browse 44 similar Security Operations tools below, compare features side-by-side, and find the best fit for your security stack.
Malware scanning tool for DFIR using 40+ engines from ReversingLabs
Malware analysis platform for SOC teams with binary analysis and threat detection
AI-powered file analysis platform delivering malware verdicts in natural language.
AI-powered malware analysis & threat research platform with chat interface.
A collection of YARA rules specifically designed for forensic investigations and malware analysis, providing pattern matching capabilities for files and memory dumps.
A Windows context menu integration tool that scans files and folders for malware patterns, crypto signatures, and malicious documents using Yara rules and PEID signatures.
yextend extends Yara's functionality by automatically handling archived and compressed content inflation, enabling pattern matching on files buried within multiple layers of archives.
A collection of YARA rules designed to identify files containing sensitive information such as usernames, passwords, and credit card numbers for penetration testing and forensic analysis.
A Yara ruleset designed to detect PHP shells and other webserver malware for malware analysis and threat detection.
OCaml bindings to the YARA scanning engine for integrating YARA scanning capabilities into OCaml projects
A command-line tool that visually displays YARA rule matches, regex matches, and hex patterns in binary data with colored output and configurable context bytes.
A Vim syntax-highlighting plugin for YARA rules that supports versions up to v4.3 and provides enhanced code readability for malware analysts.
C# wrapper around Yara pattern matching library with Loki and Yara signature support.
OCyara performs OCR on images and PDF files to extract text content and scan it against Yara rules for malware detection.
HexPrism is a fast, privacy-first hex editor built for CTFs and digital forensics.
A free endpoint security tool for host investigative capabilities to find signs of malicious activity through memory and file analysis.
A library to access and manipulate RAW image files.
Free software for extracting Microsoft cabinet files, supporting all features and formats of Microsoft cabinet files and Windows CE installation files.
A library for accessing and parsing OLE 2 Compound File (OLECF) format files, including Microsoft Office documents and thumbs.db files.
Scan files or process memory for Cobalt Strike beacons and parse their configuration.
An open source tool that generates YARA rules from installed software on running operating systems for efficient software identification in digital forensic investigations.
wxHexEditor is a free cross-platform hex editor and disk editor for editing binary files, disk devices, and logical drives with data manipulation and checksum calculation features.
A command-line string extraction utility for digital forensics that supports ASCII and Unicode string extraction from files and directories with pattern matching and filtering capabilities.
Fnord is a pattern extraction tool that analyzes obfuscated code using sliding window techniques to identify frequent byte sequences and generate experimental YARA rules for malware analysis.
A tool for signature analysis of RTF files to detect potentially unique parts and malicious documents.
A script for extracting common Windows artifacts from source images and VSCs with detailed dependencies and usage instructions.
A tool for tracking, scanning, and filtering yara files with distributed scanning capabilities.
BinaryAlert is an open-source serverless AWS pipeline that automatically scans files uploaded to S3 buckets with YARA rules and generates immediate alerts when malware is detected.
A Python script for scanning data within an IDB using Yara
A GNU Emacs editor mode that provides syntax highlighting, indentation, and language server integration for editing YARA rule files.
Scan files with Yara, match findings to VirusTotal comments.
A DFVFS backed viewer project with a WxPython GUI, aiming to enhance file extraction and viewing capabilities.
A Python 3 tool for analyzing XOR-encrypted data that can guess key lengths and decrypt XOR ciphers based on character frequency analysis.
A library for checking potentially malicious files and archives using YARA and making a decision about their harmfulness.
A tool for deep analysis of malicious files using ClamAV and YARA rules, with features like scoring suspect files, building visual tree graphs, and extracting specific patterns.
VolatilityBot automates memory dump analysis by extracting executables, detecting code injections, and performing automated malware scanning using YARA and ClamAV.
An IDA Pro plugin that uses YARA rules to automatically detect cryptographic constants and patterns in binary files during reverse engineering analysis.
A Golang application that stores and queries NIST NSRL Reference Data Set for MD5 and SHA1 hash lookups using Bolt database technology.
A yara module for searching strings inside zip files
Malscan is a tool to scan process memory for YARA matches and execute Python scripts.
A collection of Yara signatures for identifying malware and other threats
A toolkit for forensic analysis of network appliances with YARA decoding options and frame extraction capabilities.
Get strategic cybersecurity insights in your inbox