This module implements YARA bindings for Node.js. This module is supported on Linux and MacOS (using homebrew) platforms only. This module uses the installed version of libyara. You should download, compile and install your preferred version, or use one of the following commands using your system package manager: # CentOS/Red Hat sudo yum install yara-devel # Debian/Ubuntu sudo apt-get install libyara-dev # MacOS (using homebrew) sudo brew install yara This module is installed using node package manager (npm): # This module contains C++ source code which will be compiled # during installation using node-gyp. A suitable build chain # must be configured before installation. npm install yara It is loaded using the require() function: var yara = require("yara") Following initialisation of this module Scanner objects can then be created, and content scanned using YARA rules: yara.initialize(function(error) { if (error) { console.error(error.message) } else { var rule_string = [ "rule is_good {", " condition:", " true", "}" ].join("\n") var rules = [ {filename: "rules.yara"}, {string: rule_string} ] var scanner = yara.createScanner() scanner.configure({rules: rules}, function(error,
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
angr is a Python 3 library for binary analysis with various capabilities like symbolic execution and decompilation.
Python wrapper for Android APK decompilation with various converter and decompiler options.
A Django web interface for managing Yara rules with features like search, categorization, and bulk edits.
Malware sandbox for executing malicious files in an isolated environment with advanced features.
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
Exploiting a vulnerability in HID iClass system to retrieve master authentication key for cloning cards and changing reader settings.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.