Go bindings for YARA, staying as close as sensible to the library's C-API while taking inspiration from the yara-python implementation. On Unix-like systems, libyara version 4.3, corresponding header files, and pkg-config must be installed. Adding go-yara v4 to a project with Go Modules enabled, simply add the proper dependency by importing "github.com/hillu/go-yara/v4" and rebuilding your package. For custom libyara installations, use the PKG_CONFIG_PATH environment variable. Instructions for cross-building go-yara for different operating systems or architectures can be found in README.cross-building.md. On Windows, a GCC-based build environment is required for building go-yara, preferably one that includes pkg-config.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Valkyrie is a sophisticated file verdict system that enhances malware detection through behavioral analysis and extensive file feature examination.
Joe Sandbox Community provides automated cloud-based malware analysis across multiple OS platforms.
Blazingly fast Yara queries for malware analysts with an analyst-friendly web GUI.
A sandbox for quickly sandboxing known or unknown families of Android Malware
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
A tool that extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.