Intezer Yara Rules Logo

Intezer Yara Rules

0
Free
Visit Website

Yara is a powerful tool for detecting and identifying malware, viruses, and other types of malicious code. It uses a rule-based system to scan files and network traffic for specific patterns and signatures. Yara's rules are written in a simple and intuitive syntax, making it easy to create custom rules for detecting specific types of malware. Yara is widely used by security professionals and researchers to identify and analyze malware, and to develop custom detection rules for specific threats. Yara is also highly customizable, allowing users to create custom rules and plugins to extend its functionality. Overall, Yara is a powerful and flexible tool for detecting and identifying malware, and is an essential tool for any security professional or researcher.

FEATURES

ALTERNATIVES

BARF is an open source binary analysis framework for supporting various binary code analysis tasks in information security.

Binary analysis and management framework for organizing malware and exploit samples.

A tool that generates Yara rules from training data using logistic regression and random forest classifiers.

Blazingly fast Yara queries for malware analysts with an analyst-friendly web GUI.

Management portal for LoKi scanner with centralized database for scanning activities.

A collection of Android Fakebank and Tizi samples for analyzing spyware on Android devices.

A Python-based tool for detecting XSS vulnerabilities

FLARE-VM is a collection of software installation scripts for Windows systems designed for setting up and maintaining a reverse engineering environment on a virtual machine.