
Top picks: YARA-Forensics, Yara Pattern Scanner, yextend — plus 45 more compared.
Security Operationsocaml-yara is a free tool. Security professionals most commonly compare it with . All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to ocaml-yara, including their key features and shared capabilities.
A collection of YARA rules specifically designed for forensic investigations and malware analysis, providing pattern matching capabilities for files and memory dumps.
Shares 4 capabilities with ocaml-yara: Memory Forensics, File Analysis, YARA, Pattern Matching
A Windows context menu integration tool that scans files and folders for malware patterns, crypto signatures, and malicious documents using Yara rules and PEID signatures.
Shares 3 capabilities with ocaml-yara: File Analysis, YARA, Pattern Matching
yextend extends Yara's functionality by automatically handling archived and compressed content inflation, enabling pattern matching on files buried within multiple layers of archives.
Shares 3 capabilities with ocaml-yara: File Analysis, YARA, Pattern Matching
A collection of YARA rules designed to identify files containing sensitive information such as usernames, passwords, and credit card numbers for penetration testing and forensic analysis.
Shares 3 capabilities with ocaml-yara: File Analysis, YARA, Pattern Matching
A Yara ruleset designed to detect PHP shells and other webserver malware for malware analysis and threat detection.
Shares 3 capabilities with ocaml-yara: Open Source, Security Tools, YARA
OCaml bindings to the YARA scanning engine for integrating YARA scanning capabilities into OCaml projects
Shares 3 capabilities with ocaml-yara: File Analysis, Security Tools, YARA
A command-line tool that visually displays YARA rule matches, regex matches, and hex patterns in binary data with colored output and configurable context bytes.
Shares 3 capabilities with ocaml-yara: File Analysis, YARA, Pattern Matching
A Vim syntax-highlighting plugin for YARA rules that supports versions up to v4.3 and provides enhanced code readability for malware analysts.
Shares 3 capabilities with ocaml-yara: Open Source, Security Tools, YARA
A collection of YARA rules specifically designed for forensic investigations and malware analysis, providing pattern matching capabilities for files and memory dumps.
A Windows context menu integration tool that scans files and folders for malware patterns, crypto signatures, and malicious documents using Yara rules and PEID signatures.
yextend extends Yara's functionality by automatically handling archived and compressed content inflation, enabling pattern matching on files buried within multiple layers of archives.
A collection of YARA rules designed to identify files containing sensitive information such as usernames, passwords, and credit card numbers for penetration testing and forensic analysis.
A Yara ruleset designed to detect PHP shells and other webserver malware for malware analysis and threat detection.
OCaml bindings to the YARA scanning engine for integrating YARA scanning capabilities into OCaml projects
A command-line tool that visually displays YARA rule matches, regex matches, and hex patterns in binary data with colored output and configurable context bytes.
A Vim syntax-highlighting plugin for YARA rules that supports versions up to v4.3 and provides enhanced code readability for malware analysts.
C# wrapper around Yara pattern matching library with Loki and Yara signature support.
Malware scanning tool for DFIR using 40+ engines from ReversingLabs
Malware analysis platform for SOC teams with binary analysis and threat detection
AI-powered file analysis platform delivering malware verdicts in natural language.
AI-powered malware analysis & threat research platform with chat interface.
Digital forensics tools for detecting CSAM on devices and online platforms.
OCyara performs OCR on images and PDF files to extract text content and scan it against Yara rules for malware detection.
HexPrism is a fast, privacy-first hex editor built for CTFs and digital forensics.
A free endpoint security tool for host investigative capabilities to find signs of malicious activity through memory and file analysis.
A library to access and manipulate RAW image files.
Free software for extracting Microsoft cabinet files, supporting all features and formats of Microsoft cabinet files and Windows CE installation files.
A library for accessing and parsing OLE 2 Compound File (OLECF) format files, including Microsoft Office documents and thumbs.db files.
Scan files or process memory for Cobalt Strike beacons and parse their configuration.
An open source tool that generates YARA rules from installed software on running operating systems for efficient software identification in digital forensic investigations.
wxHexEditor is a free cross-platform hex editor and disk editor for editing binary files, disk devices, and logical drives with data manipulation and checksum calculation features.
A command-line string extraction utility for digital forensics that supports ASCII and Unicode string extraction from files and directories with pattern matching and filtering capabilities.
Fnord is a pattern extraction tool that analyzes obfuscated code using sliding window techniques to identify frequent byte sequences and generate experimental YARA rules for malware analysis.
A tool for signature analysis of RTF files to detect potentially unique parts and malicious documents.
A script for extracting common Windows artifacts from source images and VSCs with detailed dependencies and usage instructions.
A tool for tracking, scanning, and filtering yara files with distributed scanning capabilities.
BinaryAlert is an open-source serverless AWS pipeline that automatically scans files uploaded to S3 buckets with YARA rules and generates immediate alerts when malware is detected.
A Python script for scanning data within an IDB using Yara
A GNU Emacs editor mode that provides syntax highlighting, indentation, and language server integration for editing YARA rule files.
Scan files with Yara, match findings to VirusTotal comments.
A DFVFS backed viewer project with a WxPython GUI, aiming to enhance file extraction and viewing capabilities.
A Python 3 tool for analyzing XOR-encrypted data that can guess key lengths and decrypt XOR ciphers based on character frequency analysis.
A library for checking potentially malicious files and archives using YARA and making a decision about their harmfulness.
A tool for deep analysis of malicious files using ClamAV and YARA rules, with features like scoring suspect files, building visual tree graphs, and extracting specific patterns.
VolatilityBot automates memory dump analysis by extracting executables, detecting code injections, and performing automated malware scanning using YARA and ClamAV.
An IDA Pro plugin that uses YARA rules to automatically detect cryptographic constants and patterns in binary files during reverse engineering analysis.
A Golang application that stores and queries NIST NSRL Reference Data Set for MD5 and SHA1 hash lookups using Bolt database technology.
A yara module for searching strings inside zip files
Malscan is a tool to scan process memory for YARA matches and execute Python scripts.
A collection of Yara signatures for identifying malware and other threats
A toolkit for forensic analysis of network appliances with YARA decoding options and frame extraction capabilities.
DFIR platform for endpoint triage & investigation with EDR telemetry import
Managed DFIR service with proprietary tools for forensics & IR.
Incident investigation tool for info risks, user activity, and file exposure.
Common questions security professionals ask when evaluating alternatives and competitors to ocaml-yara.
The most popular alternatives to ocaml-yara include YARA-Forensics, Yara Pattern Scanner, yextend, Yara4Pentesters, and lw-yara. These Digital Forensics and Incident Response tools offer similar capabilities and are frequently compared by security professionals evaluating their options.