Product Hunt Launch!CybersecTools - Find and share cybersecurity tools across 944 use cases | Product Hunt

Yara Rules

Explore 33 curated cybersecurity tools, with 17,478+ visitors searching for solutions

CybersecTools - Find and share cybersecurity tools across 944 use cases | Product Hunt

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
CrowdFMS Logo

CrowdFMS is a CrowdStrike framework that automates malware sample collection from VirusTotal using YARA rule-based notifications and the Private API system.

0
ConventionEngine Logo

ConventionEngine is a Yara rule collection that analyzes PE files by examining PDB paths for suspicious keywords, terms, and anomalies that may indicate malicious software.

0
Arya - The Reverse YARA Logo

A tool that generates pseudo-malicious files to trigger YARA rules.

0
YaraHunter Logo

YaraHunter scans container images, running Docker containers, and filesystems using YARA rules to detect malware indicators and signs of compromise.

0
Malstrom Logo

Cyber Intelligence Management Platform with threat tracking, forensic artifacts, and YARA rule storage.

0
Binsequencer Logo

Binsequencer automatically generates YARA detection rules by analyzing collections of similar malware samples and identifying common x86 instruction sequences across the corpus.

0
Yara-Unprotect Logo

A collection of Yara rules for detecting malware evasion techniques

0
yara-rules Logo

A repository of YARA rules for identifying and classifying malware through pattern-based detection.

0
lw-yara Logo

A Yara ruleset designed to detect PHP shells and other webserver malware for malware analysis and threat detection.

0
Yara Mode for GNU Emacs Logo

A GNU Emacs editor mode that provides syntax highlighting, indentation, and language server integration for editing YARA rule files.

0
YARALYZER Logo

A command-line tool that visually displays YARA rule matches, regex matches, and hex patterns in binary data with colored output and configurable context bytes.

0
AutoYara Logo

AutoYara is a Java tool that automatically generates YARA rules from malware samples using biclustering algorithms to help analysts create detection rules for malware families.

0
Fnord Logo

Fnord is a pattern extraction tool that analyzes obfuscated code using sliding window techniques to identify frequent byte sequences and generate experimental YARA rules for malware analysis.

0
ThreatKB Logo

Knowledge base workflow management dashboard for YARA rules and C2 artifacts.

0
Yara Decompressor Logo

A tool that enables Yara rule execution against compressed malware samples, supporting GZip, BZip2, and LZMA formats without manual decompression.

0
Yara4Pentesters Logo

A collection of YARA rules designed to identify files containing sensitive information such as usernames, passwords, and credit card numbers for penetration testing and forensic analysis.

0
Vim Syntax Highlighting for YARA Rules Logo

A Vim syntax-highlighting plugin for YARA rules that supports versions up to v4.3 and provides enhanced code readability for malware analysts.

0
Canadian Centre for Cyber Security CCCS YARA Specification Logo

Define and validate YARA rule metadata with CCCS YARA Specification.

0
findcrypt-yara Logo

An IDA Pro plugin that uses YARA rules to automatically detect cryptographic constants and patterns in binary files during reverse engineering analysis.

0
OCyara Logo

OCyara performs OCR on images and PDF files to extract text content and scan it against Yara rules for malware detection.

0
Yara-Scanner Logo

A Python-based Burp Suite extension that integrates Yara scanning capabilities for detecting patterns and signatures in web application traffic using custom Yara rules.

0
YARA-Forensics Logo

A collection of YARA rules specifically designed for forensic investigations and malware analysis, providing pattern matching capabilities for files and memory dumps.

0
Malware Signatures Overview Logo

A collection of Yara signatures developed by Citizen Lab to detect malware used in targeted attacks against civil society organizations.

0
Burp-Yara-Rules Logo

A collection of Yara rules for the Burp Yara-Scanner extension that helps identify malicious software and infected web pages during web application security assessments.

0