Go bindings for YARA, staying as close as sensible to the library's C-API while taking inspiration from the yara-python implementation. On Unix-like systems, libyara version 4.3, corresponding header files, and pkg-config must be installed. Adding go-yara v4 to a project with Go Modules enabled, simply add the proper dependency by importing "github.com/hillu/go-yara/v4" and rebuilding your package. For custom libyara installations, use the PKG_CONFIG_PATH environment variable. Instructions for cross-building go-yara for different operating systems or architectures can be found in README.cross-building.md. On Windows, a GCC-based build environment is required for building go-yara, preferably one that includes pkg-config.
Common questions about go-yara including features, pricing, alternatives, and user reviews.
go-yara is Go bindings for YARA with installation and build instructions. It is a Security Operations solution designed to help security teams with Binary Analysis, YARA.
go-yara is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/hillu/go-yara/ for download and installation instructions.
Popular alternatives to go-yara include:
Compare these tools and more at https://cybersectools.com/categories/security-operations
go-yara is for security teams and organizations that need Binary Analysis, YARA. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Malware analysis platform for SOC teams with binary analysis and threat detection
A Windows context menu integration tool that scans files and folders for malware patterns, crypto signatures, and malicious documents using Yara rules and PEID signatures.
Fnord is a pattern extraction tool that analyzes obfuscated code using sliding window techniques to identify frequent byte sequences and generate experimental YARA rules for malware analysis.