go-yara Logo

go-yara

0
Free
Visit Website

Go bindings for YARA, staying as close as sensible to the library's C-API while taking inspiration from the yara-python implementation. On Unix-like systems, libyara version 4.3, corresponding header files, and pkg-config must be installed. Adding go-yara v4 to a project with Go Modules enabled, simply add the proper dependency by importing "github.com/hillu/go-yara/v4" and rebuilding your package. For custom libyara installations, use the PKG_CONFIG_PATH environment variable. Instructions for cross-building go-yara for different operating systems or architectures can be found in README.cross-building.md. On Windows, a GCC-based build environment is required for building go-yara, preferably one that includes pkg-config.

FEATURES

ALTERNATIVES

A command-line program for finding secrets and sensitive information in textual data and Git history.

YARA is a tool for identifying and classifying malware samples based on textual or binary patterns.

A tool for reverse engineering Android apk files.

A tool for identifying and analyzing Java serialized objects in network traffic

A collection of XSS payloads designed to turn alert(1) into P1

Yaraprocessor allows for scanning data streams in unique ways and dynamic scanning of payloads from network packet captures.

A tool to locally check for signs of a rootkit with various checks and tests.

OCyara performs OCR on image files and scans them for matches to Yara rules, supporting Debian-based Linux distros.