CybersecTools API access is now live!Learn More

Pattern Matching

Browse 25 pattern matching tools

Automated sensitive data classification across DBs, files, and streams.

Real-time sandboxing and malware detection engine with heuristic emulation

Pattern matching library for strings against large lists of glob patterns

DLP solution for preventing data leaks in generative AI services

Detects secrets and credentials in code using AI/ML and Code Property Graph

Email DLP solution scanning inbound/outbound emails for data leak prevention

Scans logs and data streams to detect and redact sensitive data in real-time.

A repository of YARA rules for identifying and classifying malware through pattern-based detection.

A command-line tool that visually displays YARA rule matches, regex matches, and hex patterns in binary data with colored output and configurable context bytes.

An OCaml Ctypes wrapper for the YARA matching engine that enables malware identification capabilities in OCaml applications.

Fnord is a pattern extraction tool that analyzes obfuscated code using sliding window techniques to identify frequent byte sequences and generate experimental YARA rules for malware analysis.

A low interaction client honeypot that detects malicious websites using signature, anomaly and pattern matching techniques with automated URL collection and JavaScript analysis capabilities.

A collection of YARA rules designed to identify files containing sensitive information such as usernames, passwords, and credit card numbers for penetration testing and forensic analysis.

YARA is a tool for identifying and classifying malware samples based on textual or binary patterns.

A command-line string extraction utility for digital forensics that supports ASCII and Unicode string extraction from files and directories with pattern matching and filtering capabilities.

An IDA Pro plugin that uses YARA rules to automatically detect cryptographic constants and patterns in binary files during reverse engineering analysis.

OCyara performs OCR on images and PDF files to extract text content and scan it against Yara rules for malware detection.

A Python-based Burp Suite extension that integrates Yara scanning capabilities for detecting patterns and signatures in web application traffic using custom Yara rules.

A Windows context menu integration tool that scans files and folders for malware patterns, crypto signatures, and malicious documents using Yara rules and PEID signatures.

A collection of YARA rules specifically designed for forensic investigations and malware analysis, providing pattern matching capabilities for files and memory dumps.

A secrets detection tool that scans GitHub, GitLab, and Bitbucket repositories to identify API keys, access tokens, and other sensitive information in source code.

A tool that generates YARA rules to search for specific terms within base64-encoded malware samples by enumerating all possible encoding variations.

C# wrapper around Yara pattern matching library with Loki and Yara signature support.

A community-maintained repository of YARA rules for detecting and classifying malware based on patterns and characteristics.