Product Hunt Launch!CybersecTools - Find and share cybersecurity tools across 944 use cases | Product Hunt
Burp-Yara-Rules Logo

Burp-Yara-Rules

A collection of Yara rules for the Burp Yara-Scanner extension that helps identify malicious software and infected web pages during web application security assessments.

49
Application Security
Free
Visit website
Claim and verify your listing
Claim and verify your listing
0

Burp-Yara-Rules Description

Burp-Yara-Rules is a collection of Yara rules designed for use with the Burp Yara-Scanner extension during web application security assessments. The ruleset includes detection patterns built from malicious code samples found on the Internet and contributions from third-party sources. These rules help identify malicious software commonly hosted on websites and detect signs of infection in web applications. The rules cover multiple file types and code formats: - HTML code analysis for malicious patterns - JavaScript code inspection for suspicious elements - CSS code examination for embedded threats - JAR file detection for infected Java archives - PDF file analysis for malicious content The tool integrates with Burp Suite through the Yara-Scanner extension, allowing security professionals to scan web applications for indicators of compromise during penetration testing and security assessments. The rules aim to identify infected web pages and help assess the security posture of web applications by detecting various forms of malware and malicious code injection.

Burp-Yara-Rules FAQ

Common questions about Burp-Yara-Rules including features, pricing, alternatives, and user reviews.

Burp-Yara-Rules is A collection of Yara rules for the Burp Yara-Scanner extension that helps identify malicious software and infected web pages during web application security assessments.. It is a Application Security solution designed to help security teams with Malware Analysis, Web Security, Security Scanning.

Have more questions? Browse our categories or search for specific tools.

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Stay Updated with Mandos Brief

Get the latest cybersecurity updates in your inbox

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

13
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

7
TestSavantAI Logo

Security platform that provides protection, monitoring and governance for enterprise generative AI applications and LLMs against various threats including prompt injection and data poisoning.

5
OSINTLeak Logo

OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.

5
Mandos Brief Cybersecurity Newsletter Logo

Weekly cybersecurity newsletter for security leaders and professionals

5
View Popular Tools →