A set of OCaml bindings to the YARA scanning engine, allowing you to integrate YARA scanning capabilities into your OCaml projects. This library provides a simple and easy-to-use interface to the YARA scanning engine, allowing you to write OCaml code that can scan files and detect malware. The library is designed to be easy to use and provides a simple interface to the YARA scanning engine, making it easy to integrate YARA scanning capabilities into your OCaml projects.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A tool that detects dangling DNS records in a multi-cloud environment to prevent subdomain takeovers.
A comprehensive database of exploits and vulnerabilities for researchers and professionals
An AI-powered Google Dorking tool that helps create effective search queries to uncover sensitive information on the internet.
A collection of Ansible roles for hardening various systems and services
A small script to check a list of domains against open redirect vulnerability
Python-based extension for integrating a Yara scanner into Burp Suite for on-demand website scans based on custom rules.
A disclosure of a bug found in Twitter's Vine and the process of procuring the source code.
A tool that showcases the attack surface of a given Android device, highlighting potential vulnerabilities and security risks.
A vulnerability scanner that helps you identify and fix vulnerabilities in your code
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.