dnYara is a .Net wrapper library for the native Yara library. Unlike other wrappers for .Net which are statically linked managed C++ wrappers, dnYara has been made in C# for .Net Standard 2.0, ensuring interoperability and portability for various .Net applications and operating systems. YARA is an open-source tool developed to help malware researchers quickly identify and classify malware samples by creating pattern-based rules to scan malwares and describe malware families based on text or binary patterns.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Valkyrie is a sophisticated file verdict system that enhances malware detection through behavioral analysis and extensive file feature examination.
A static analysis tool for PE files that detects malicious behavior and provides information for manual analysis.
Joe Sandbox Community provides automated cloud-based malware analysis across multiple OS platforms.
Code to prevent a managed .NET debugger/profiler from working.
A program to manage yara ruleset in a database with support for different databases and configuration options.
PinCTF is a tool for using Intel's Pin Tool to instrument reverse engineering binaries and count instructions.
Blazingly fast Yara queries for malware analysts with an analyst-friendly web GUI.
Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.