Loading...

Looking for alternatives to yara-rust? Bindings for the Yara library from VirusTotal with support for Yara v4.2 and various features like rule compilation and scanning. Browse 24 similar Security Operations tools below, compare features side-by-side, and find the best fit for your security stack.
Expands a single malware hash into full family visibility via structural analysis.
Repository for detection content with various types of rules and payloads.
A set of rules for detecting threats in various formats, including Snort, Yara, ClamAV, and HXIOC.
A collection of YARA rules for public use, built from intelligence profiles and file work.
Define and validate YARA rule metadata with CCCS YARA Specification.
A free web-based Yara debugger for security analysts to write hunting or detection rules with ease.
KLara is a distributed system written in Python that helps Threat Intelligence researchers hunt for new malware using Yara.
YARA signature and IOC database for LOKI and THOR Lite scanners with high quality rules and IOCs.
A project providing open-source YARA rules for malware and malicious file detection
A tool for quick and effective Yara rule creation to isolate malware families and malicious objects.
A repository of Yara signatures under the GNU-GPLv2 license for the cybersecurity community.
A repository of freely usable Yara rules for detection systems, with automated error detection workflows.
A tool that generates Yara rules for strings and their XOR encoded versions, as well as base64-encoded variations with different padding possibilities.
A set of interrelated detection rules for improving detection and hunting visibility and context
A collection of public YARA signatures for various malware families.
Tool for visualizing correspondences between YARA ruleset and samples
Repository of automatically generated YARA rules from Malpedia's YARA-Signator with detailed statistics.
Embeddable Yara library for Java with support for loading rules and scanning data.
Official repository of YARA rules for threat detection and hunting
Repository of scripts, signatures, and IOCs related to various malware analysis topics.
Get strategic cybersecurity insights in your inbox