YARA Logo

YARA

0
Free
Visit Website

YARA is a tool aimed at helping malware researchers to identify and classify malware samples by creating descriptions of malware families based on textual or binary patterns through rules consisting of strings and boolean expressions. It allows for the creation of complex rules using wild-cards, case-insensitive strings, regular expressions, and special operators.

FEATURES

ALTERNATIVES

A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.

A malware processing and analytics tool that utilizes Pig, Django, and Elasticsearch to analyze and visualize malware data.

BARF is an open source binary analysis framework for supporting various binary code analysis tasks in information security.

A toolkit for detecting and tracking Blind XSS, XXE, and SSRF vulnerabilities

Detect capabilities in executable files and identify potential behaviors.

A program to manage yara ruleset in a database with support for different databases and configuration options.

Blazingly fast Yara queries for malware analysts with an analyst-friendly web GUI.

YaraHunter scans container images, running Docker containers, and filesystems to find indicators of malware.