
yextend is a free Digital Forensics and Incident Response tool. Security professionals most commonly compare it with . All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to yextend, including their key features and shared capabilities.
A Windows context menu integration tool that scans files and folders for malware patterns, crypto signatures, and malicious documents using Yara rules and PEID signatures.
Shares 3 capabilities with yextend: File Analysis, YARA, Pattern Matching
A collection of YARA rules designed to identify files containing sensitive information such as usernames, passwords, and credit card numbers for penetration testing and forensic analysis.
Shares 3 capabilities with yextend: File Analysis, YARA, Pattern Matching
An OCaml Ctypes wrapper for the YARA matching engine that enables malware identification capabilities in OCaml applications.
Shares 3 capabilities with yextend: File Analysis, YARA, Pattern Matching
A collection of YARA rules specifically designed for forensic investigations and malware analysis, providing pattern matching capabilities for files and memory dumps.
Shares 3 capabilities with yextend: File Analysis, YARA, Pattern Matching
A command-line tool that visually displays YARA rule matches, regex matches, and hex patterns in binary data with colored output and configurable context bytes.
Shares 3 capabilities with yextend: File Analysis, YARA, Pattern Matching
C# wrapper around Yara pattern matching library with Loki and Yara signature support.
Shares 3 capabilities with yextend: File Analysis, YARA, Pattern Matching
Malware scanning tool for DFIR using 40+ engines from ReversingLabs
Malware analysis platform for SOC teams with binary analysis and threat detection
A Windows context menu integration tool that scans files and folders for malware patterns, crypto signatures, and malicious documents using Yara rules and PEID signatures.
A collection of YARA rules designed to identify files containing sensitive information such as usernames, passwords, and credit card numbers for penetration testing and forensic analysis.
An OCaml Ctypes wrapper for the YARA matching engine that enables malware identification capabilities in OCaml applications.
A collection of YARA rules specifically designed for forensic investigations and malware analysis, providing pattern matching capabilities for files and memory dumps.
A command-line tool that visually displays YARA rule matches, regex matches, and hex patterns in binary data with colored output and configurable context bytes.
C# wrapper around Yara pattern matching library with Loki and Yara signature support.
Malware scanning tool for DFIR using 40+ engines from ReversingLabs
Malware analysis platform for SOC teams with binary analysis and threat detection
AI-powered file analysis platform delivering malware verdicts in natural language.
AI-powered malware analysis & threat research platform with chat interface.
OCyara performs OCR on images and PDF files to extract text content and scan it against Yara rules for malware detection.
A command-line string extraction utility for digital forensics that supports ASCII and Unicode string extraction from files and directories with pattern matching and filtering capabilities.
Fnord is a pattern extraction tool that analyzes obfuscated code using sliding window techniques to identify frequent byte sequences and generate experimental YARA rules for malware analysis.
A tool for signature analysis of RTF files to detect potentially unique parts and malicious documents.
A tool for tracking, scanning, and filtering yara files with distributed scanning capabilities.
A Python script for scanning data within an IDB using Yara
Scan files with Yara, match findings to VirusTotal comments.
OCaml bindings to the YARA scanning engine for integrating YARA scanning capabilities into OCaml projects
A library for checking potentially malicious files and archives using YARA and making a decision about their harmfulness.
A tool for deep analysis of malicious files using ClamAV and YARA rules, with features like scoring suspect files, building visual tree graphs, and extracting specific patterns.
An IDA Pro plugin that uses YARA rules to automatically detect cryptographic constants and patterns in binary files during reverse engineering analysis.
A yara module for searching strings inside zip files
A collection of Yara signatures for identifying malware and other threats
DFIR platform for endpoint triage & investigation with EDR telemetry import
Managed DFIR service with proprietary tools for forensics & IR.
Incident investigation tool for info risks, user activity, and file exposure.
Deep learning-based malware analysis & threat contextualization platform.
Cloud-based bare-metal malware analysis lab for SOC, CERT & CIRT teams.
Email forensics tool for analyzing MIME header fields across 20+ formats.
FIM and config change monitoring tool with baseline deviation detection.
A versatile steganography tool with various installation options and detailed usage instructions.
Steghide is a steganography program for hiding data in image and audio files.
A forensic analysis tool that extracts and parses logs, notifications, and system information from iOS/iPadOS devices and backups.
HexPrism is a fast, privacy-first hex editor built for CTFs and digital forensics.
A command-line tool for creating hex dumps, converting between binary and human-readable representations, and patching binary files.
A static analysis framework for extracting key characteristics from various file formats
A free endpoint security tool for host investigative capabilities to find signs of malicious activity through memory and file analysis.
A library to access and manipulate RAW image files.
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
A library for accessing and parsing Extensible Storage Engine (ESE) Database Files used by Microsoft applications like Windows Search, Exchange, and Active Directory for forensic analysis purposes.
Free software for extracting Microsoft cabinet files, supporting all features and formats of Microsoft cabinet files and Windows CE installation files.
A free, fast, and flexible multi-platform IOC and YARA scanner for Windows, Linux, and macOS.
An open source format for storing digital evidence and data, with a C/C++ library for creating, reading, and manipulating AFF4 images.
A library for accessing and parsing OLE 2 Compound File (OLECF) format files, including Microsoft Office documents and thumbs.db files.
A command-line tool that extracts detailed technical information, metadata, and checksums from JPEG image files with support for multiple output formats.
A library and tools to access and manipulate VMware Virtual Disk (VMDK) files.
Common questions security professionals ask when evaluating alternatives and competitors to yextend.
The most popular alternatives to yextend include Yara Pattern Scanner, Yara4Pentesters, ocaml-yara, YARA-Forensics, and YARALYZER. These Digital Forensics and Incident Response tools offer similar capabilities and are frequently compared by security professionals evaluating their options.