go-yara
Go bindings for YARA with installation and build instructions.

go-yara
Go bindings for YARA with installation and build instructions.
go-yara Description
Go bindings for YARA, staying as close as sensible to the library's C-API while taking inspiration from the yara-python implementation. On Unix-like systems, libyara version 4.3, corresponding header files, and pkg-config must be installed. Adding go-yara v4 to a project with Go Modules enabled, simply add the proper dependency by importing "github.com/hillu/go-yara/v4" and rebuilding your package. For custom libyara installations, use the PKG_CONFIG_PATH environment variable. Instructions for cross-building go-yara for different operating systems or architectures can be found in README.cross-building.md. On Windows, a GCC-based build environment is required for building go-yara, preferably one that includes pkg-config.
go-yara FAQ
Common questions about go-yara including features, pricing, alternatives, and user reviews.
go-yara is Go bindings for YARA with installation and build instructions.. It is a Security Operations solution designed to help security teams with Binary Analysis, YARA.
ALTERNATIVES
Malware analysis platform for SOC teams with binary analysis and threat detection
A Windows context menu integration tool that scans files and folders for malware patterns, crypto signatures, and malicious documents using Yara rules and PEID signatures.
Fnord is a pattern extraction tool that analyzes obfuscated code using sliding window techniques to identify frequent byte sequences and generate experimental YARA rules for malware analysis.
Use FindYara, an IDA python plugin, to scan your binary with yara rules and quickly jump to matches.
POPULAR
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox