go-yara Logo

go-yara

0
Free
Visit Website

Go bindings for YARA, staying as close as sensible to the library's C-API while taking inspiration from the yara-python implementation. On Unix-like systems, libyara version 4.3, corresponding header files, and pkg-config must be installed. Adding go-yara v4 to a project with Go Modules enabled, simply add the proper dependency by importing "github.com/hillu/go-yara/v4" and rebuilding your package. For custom libyara installations, use the PKG_CONFIG_PATH environment variable. Instructions for cross-building go-yara for different operating systems or architectures can be found in README.cross-building.md. On Windows, a GCC-based build environment is required for building go-yara, preferably one that includes pkg-config.

FEATURES

ALTERNATIVES

A native Python cross-version decompiler and fragment decompiler.

Largest open collection of Android malware samples, with 298 samples and contributions welcome.

angr is a Python 3 library for binary analysis with various capabilities like symbolic execution and decompilation.

Automate the exploitation of XXE vulnerabilities

Binary Ninja is an interactive decompiler, disassembler, debugger, and binary analysis platform with a focus on automation and a clean GUI.

Malware sandbox for executing malicious files in an isolated environment with advanced features.

A tool for reverse engineering Android apk files.

Andromeda makes reverse engineering of Android applications faster and easier.