Loading...

YARA-Forensics is a free Digital Forensics and Incident Response tool. Security professionals most commonly compare it with . All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to YARA-Forensics, including their key features and shared capabilities.
A Windows context menu integration tool that scans files and folders for malware patterns, crypto signatures, and malicious documents using Yara rules and PEID signatures.
Shares 4 capabilities with YARA-Forensics: Binary Analysis, File Analysis, YARA, Pattern Matching
An OCaml Ctypes wrapper for the YARA matching engine that enables malware identification capabilities in OCaml applications.
Shares 4 capabilities with YARA-Forensics: Memory Forensics, File Analysis, YARA, Pattern Matching
A command-line tool that visually displays YARA rule matches, regex matches, and hex patterns in binary data with colored output and configurable context bytes.
Shares 4 capabilities with YARA-Forensics: Binary Analysis, File Analysis, YARA, Pattern Matching
Malware analysis platform for SOC teams with binary analysis and threat detection
Shares 3 capabilities with YARA-Forensics: Binary Analysis, File Analysis, YARA
yextend extends Yara's functionality by automatically handling archived and compressed content inflation, enabling pattern matching on files buried within multiple layers of archives.
Shares 3 capabilities with YARA-Forensics: File Analysis, YARA, Pattern Matching
A collection of YARA rules designed to identify files containing sensitive information such as usernames, passwords, and credit card numbers for penetration testing and forensic analysis.
Shares 3 capabilities with YARA-Forensics: File Analysis, YARA, Pattern Matching
A command-line string extraction utility for digital forensics that supports ASCII and Unicode string extraction from files and directories with pattern matching and filtering capabilities.
Shares 3 capabilities with YARA-Forensics: Binary Analysis, File Analysis, Pattern Matching
Fnord is a pattern extraction tool that analyzes obfuscated code using sliding window techniques to identify frequent byte sequences and generate experimental YARA rules for malware analysis.
Shares 3 capabilities with YARA-Forensics: Binary Analysis, YARA, Pattern Matching
A Windows context menu integration tool that scans files and folders for malware patterns, crypto signatures, and malicious documents using Yara rules and PEID signatures.
An OCaml Ctypes wrapper for the YARA matching engine that enables malware identification capabilities in OCaml applications.
A command-line tool that visually displays YARA rule matches, regex matches, and hex patterns in binary data with colored output and configurable context bytes.
Malware analysis platform for SOC teams with binary analysis and threat detection
yextend extends Yara's functionality by automatically handling archived and compressed content inflation, enabling pattern matching on files buried within multiple layers of archives.
A collection of YARA rules designed to identify files containing sensitive information such as usernames, passwords, and credit card numbers for penetration testing and forensic analysis.
A command-line string extraction utility for digital forensics that supports ASCII and Unicode string extraction from files and directories with pattern matching and filtering capabilities.
Fnord is a pattern extraction tool that analyzes obfuscated code using sliding window techniques to identify frequent byte sequences and generate experimental YARA rules for malware analysis.
A Python script for scanning data within an IDB using Yara
VolatilityBot automates memory dump analysis by extracting executables, detecting code injections, and performing automated malware scanning using YARA and ClamAV.
An IDA Pro plugin that uses YARA rules to automatically detect cryptographic constants and patterns in binary files during reverse engineering analysis.
C# wrapper around Yara pattern matching library with Loki and Yara signature support.
A collection of Yara signatures for identifying malware and other threats
Malware scanning tool for DFIR using 40+ engines from ReversingLabs
AI-powered file analysis platform delivering malware verdicts in natural language.
AI-powered malware analysis & threat research platform with chat interface.
OCyara performs OCR on images and PDF files to extract text content and scan it against Yara rules for malware detection.
HexPrism is a fast, privacy-first hex editor built for CTFs and digital forensics.
A command-line tool for creating hex dumps, converting between binary and human-readable representations, and patching binary files.
A static analysis framework for extracting key characteristics from various file formats
A free endpoint security tool for host investigative capabilities to find signs of malicious activity through memory and file analysis.
A command-line utility for extracting human-readable text from binary files.
A comprehensive malware-analysis tool that utilizes external AV scanners to identify malicious elements in binary files.
Scan files or process memory for Cobalt Strike beacons and parse their configuration.
Python 3 tool for parsing Yara rules with ongoing development.
wxHexEditor is a free cross-platform hex editor and disk editor for editing binary files, disk devices, and logical drives with data manipulation and checksum calculation features.
A tool for creating compact Linux memory dumps compatible with popular debugging tools.
Use FindYara, an IDA python plugin, to scan your binary with yara rules and quickly jump to matches.
A tool for signature analysis of RTF files to detect potentially unique parts and malicious documents.
A tool for tracking, scanning, and filtering yara files with distributed scanning capabilities.
A .Net wrapper library for the native Yara library with interoperability and portability features.
dynStruct is a tool for monitoring memory accesses of an ELF binary and recovering structures of the original code.
A tool for processing compiled YARA rules in IDA.
A new age tool for binary analysis that uses statistical visualizations to help find patterns in large amounts of binary data.
Scan files with Yara, match findings to VirusTotal comments.
OCaml bindings to the YARA scanning engine for integrating YARA scanning capabilities into OCaml projects
A minimal library to generate YARA rules from JAVA with maven support.
VxSig is a Google-developed tool that automatically generates antivirus byte signatures from similar binaries for Yara and ClamAV detection engines.
YARA module for supporting DCSO format bloom filters with hashlookup capabilities.
Go bindings for YARA with installation and build instructions.
A library for checking potentially malicious files and archives using YARA and making a decision about their harmfulness.
A tool for deep analysis of malicious files using ClamAV and YARA rules, with features like scoring suspect files, building visual tree graphs, and extracting specific patterns.
A command-line tool for analyzing and extracting detailed information from Windows Portable Executable (PE) files.
Generate Yara rules from function basic blocks in x64dbg.
A command-line utility and Python package for mounting and unmounting various disk image formats with support for different volume systems and filesystems.
A yara module for searching strings inside zip files
Common questions security professionals ask when evaluating alternatives and competitors to YARA-Forensics.
The most popular alternatives to YARA-Forensics include Yara Pattern Scanner, ocaml-yara, YARALYZER, ReversingLabs Spectra Analyze, and yextend. These Digital Forensics and Incident Response tools offer similar capabilities and are frequently compared by security professionals evaluating their options.