Burp-Yara-Rules Logo

Burp-Yara-Rules

A collection of Yara rules for the Burp Yara-Scanner extension that helps identify malicious software and infected web pages during web application security assessments.

49
Visit website
Claim and verify your listing
0

Burp-Yara-Rules Description

Burp-Yara-Rules is a collection of Yara rules designed for use with the Burp Yara-Scanner extension during web application security assessments. The ruleset includes detection patterns built from malicious code samples found on the Internet and contributions from third-party sources. These rules help identify malicious software commonly hosted on websites and detect signs of infection in web applications. The rules cover multiple file types and code formats: - HTML code analysis for malicious patterns - JavaScript code inspection for suspicious elements - CSS code examination for embedded threats - JAR file detection for infected Java archives - PDF file analysis for malicious content The tool integrates with Burp Suite through the Yara-Scanner extension, allowing security professionals to scan web applications for indicators of compromise during penetration testing and security assessments. The rules aim to identify infected web pages and help assess the security posture of web applications by detecting various forms of malware and malicious code injection.

Burp-Yara-Rules FAQ

Common questions about Burp-Yara-Rules including features, pricing, alternatives, and user reviews.

Burp-Yara-Rules is A collection of Yara rules for the Burp Yara-Scanner extension that helps identify malicious software and infected web pages during web application security assessments.. It is a Application Security solution designed to help security teams with Malware Analysis, Web Security, Security Scanning.

Have more questions? Browse our categories or search for specific tools.

FEATURED

Heeler Application Security Auto-Remediation Logo

Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

Mandos Fractional CISO Logo

Fractional CISO services for B2B companies to build security programs

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

13
OSINTLeak Real-time OSINT Leak Intelligence Logo

Real-time OSINT monitoring for leaked credentials, data, and infrastructure

8
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

6
Mandos Brief Logo

Weekly cybersecurity newsletter covering security incidents, AI, and leadership

6
TestSavant AI Security Assurance Platform Logo

AI security assurance platform for red-teaming, guardrails & compliance

5
View Popular Tools →

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox