dnYara is a .Net wrapper library for the native Yara library. Unlike other wrappers for .Net which are statically linked managed C++ wrappers, dnYara has been made in C# for .Net Standard 2.0, ensuring interoperability and portability for various .Net applications and operating systems. YARA is an open-source tool developed to help malware researchers quickly identify and classify malware samples by creating pattern-based rules to scan malwares and describe malware families based on text or binary patterns.
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
Ropper is a tool for analyzing binary files and searching for gadgets to build rop chains for different architectures.
Use FindYara, an IDA python plugin, to scan your binary with yara rules and quickly jump to matches.
Collection of malware persistence information and techniques
KLara is a distributed system written in Python that helps Threat Intelligence researchers hunt for new malware using Yara.
A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence
A tool that scans a corpus of malware and builds a YARA rule to detect similar code sections.