Loading...
Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management. Task: Yara
Browse 138 security tools
AI-powered malware analysis & threat research platform with chat interface.
Expands a single malware hash into full family visibility via structural analysis.
AI-powered file analysis platform delivering malware verdicts in natural language.
Cloud-based bare-metal malware analysis lab for SOC, CERT & CIRT teams.
Deep learning-based malware analysis & threat contextualization platform.
On-premise AI file repository with continuous malware analysis and retrohunting.
Malware hunting platform that auto-generates YARA rules from shared code analysis.
Managed DFIR service with proprietary tools for forensics & IR.
DFIR platform for endpoint triage & investigation with EDR telemetry import
Malware analysis platform for SOC teams with binary analysis and threat detection
Malware scanning tool for DFIR using 40+ engines from ReversingLabs
Cloud-native SIEM, SOAR, and threat intel platform for SecOps teams
A Windows context menu integration tool that scans files and folders for malware patterns, crypto signatures, and malicious documents using Yara rules and PEID signatures.
OCyara performs OCR on images and PDF files to extract text content and scan it against Yara rules for malware detection.
A toolkit for forensic analysis of network appliances with YARA decoding options and frame extraction capabilities.
Syntax, indent, and filetype detection for YARA rule files with auto-indenting and error display in quickfix window.
A collection of Yara signatures for identifying malware and other threats
An IDAPython script that generates YARA rules for basic blocks of the current function in IDA Pro, with automatic masking of relocation bytes and optional validation against file segments.
YARA syntax highlighting for Gtk-based text editors
Malscan is a tool to scan process memory for YARA matches and execute Python scripts.
A repository of YARA rules for identifying and classifying malware through pattern-based detection.
Repository of scripts, signatures, and IOCs related to various malware analysis topics.
Get strategic cybersecurity insights in your inbox