go-yara Logo

go-yara

0
Free
Visit Website

Go bindings for YARA, staying as close as sensible to the library's C-API while taking inspiration from the yara-python implementation. On Unix-like systems, libyara version 4.3, corresponding header files, and pkg-config must be installed. Adding go-yara v4 to a project with Go Modules enabled, simply add the proper dependency by importing "github.com/hillu/go-yara/v4" and rebuilding your package. For custom libyara installations, use the PKG_CONFIG_PATH environment variable. Instructions for cross-building go-yara for different operating systems or architectures can be found in README.cross-building.md. On Windows, a GCC-based build environment is required for building go-yara, preferably one that includes pkg-config.

FEATURES

ALTERNATIVES

Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.

Leading open source automated malware analysis system.

UDcide provides an alternative approach to dealing with Android malware by targeting specific behaviors for removal.

Malware sandbox for executing malicious files in an isolated environment with advanced features.

A Go library for manipulating YARA rulesets with the ability to programatically change metadata, rule names, and more.

Boomerang Decompiler is a machine code decompiler supporting various architectures and file formats, with a focus on high-level language output.

Automatic YARA rule generation for malware repositories.

Online Java decompiler tool with support for modern Java features.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved