go-yara Logo

go-yara

0
Free
Visit Website

Go bindings for YARA, staying as close as sensible to the library's C-API while taking inspiration from the yara-python implementation. On Unix-like systems, libyara version 4.3, corresponding header files, and pkg-config must be installed. Adding go-yara v4 to a project with Go Modules enabled, simply add the proper dependency by importing "github.com/hillu/go-yara/v4" and rebuilding your package. For custom libyara installations, use the PKG_CONFIG_PATH environment variable. Instructions for cross-building go-yara for different operating systems or architectures can be found in README.cross-building.md. On Windows, a GCC-based build environment is required for building go-yara, preferably one that includes pkg-config.

FEATURES

ALTERNATIVES

A simple Python script to test for a hypothetical JWT vulnerability

Define and validate YARA rule metadata with CCCS YARA Specification.

Collection of slides, materials, demos, crackmes, and writeups from r2con-2017 conference.

Scans running processes for potentially malicious implants and dumps them.

A tool to locally check for signs of a rootkit with various checks and tests.

Hyara is a plugin that simplifies writing YARA rules with various convenient features.

A framework for reverse engineering Flutter apps with modified Flutter library for dynamic analysis and traffic monitoring.

Pwndbg is a GDB plug-in that enhances the debugging experience for low-level software developers, hardware hackers, reverse-engineers, and exploit developers.

PINNED