Burp-Yara-Rules Logo

Burp-Yara-Rules

0
Free
49
26 Jan 2022
10 September 2025
Visit Website

Burp-Yara-Rules is a collection of Yara rules designed for use with the Burp Yara-Scanner extension during web application security assessments. The ruleset includes detection patterns built from malicious code samples found on the Internet and contributions from third-party sources. These rules help identify malicious software commonly hosted on websites and detect signs of infection in web applications. The rules cover multiple file types and code formats: - HTML code analysis for malicious patterns - JavaScript code inspection for suspicious elements - CSS code examination for embedded threats - JAR file detection for infected Java archives - PDF file analysis for malicious content The tool integrates with Burp Suite through the Yara-Scanner extension, allowing security professionals to scan web applications for indicators of compromise during penetration testing and security assessments. The rules aim to identify infected web pages and help assess the security posture of web applications by detecting various forms of malware and malicious code injection.

FEATURES

SIMILAR TOOLS

Grafeas is an API specification for managing and auditing metadata about software resources across the software supply chain.

A brute-force protection middleware for express routes that rate-limits incoming requests.

QIRA is a competitor to strace and gdb with MIT license, supporting Ubuntu and Docker for wider compatibility.

A plugin for viewing, detecting weak configurations, and generating Content Security Policy headers.

Search engine for open-source Git repositories with advanced features like case sensitivity and regular expressions.

SearchCode is an extensive code search engine that indexes 75 billion lines of code from millions of projects to help developers find coding examples and libraries.

An open-source tool that automates the detection and analysis of DLL hijacking vulnerabilities in Windows applications, providing detailed reports and remediation guidance.

Bearer CLI is a static application security testing tool that scans source code across multiple programming languages to identify and prioritize OWASP Top 10 and CWE Top 25 security vulnerabilities through data flow analysis.

A comprehensive toolkit for web application security testing, offering a range of products and solutions for identifying vulnerabilities and improving security posture.

PINNED

RoboShadow Logo

A cybersecurity platform that offers vulnerability scanning, Windows Defender and 3rd party AV management, and MFA compliance reporting, among other features.

Vulnerability Management
Proton Pass Logo

Proton Pass is a cross-platform password manager that provides encrypted storage, password generation, and security monitoring features with integrated 2FA and dark web monitoring capabilities.

Data Protection
NordVPN Logo

NordVPN is a commercial VPN service that encrypts internet connections and hides IP addresses through a global network of servers, featuring integrated threat protection and multi-device support.

Network Security
Mandos Logo

Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Consulting
CybersecTools logoCybersecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved