YARA is a tool aimed at helping malware researchers to identify and classify malware samples by creating descriptions of malware families based on textual or binary patterns through rules consisting of strings and boolean expressions. It allows for the creation of complex rules using wild-cards, case-insensitive strings, regular expressions, and special operators.
FEATURES
SIMILAR TOOLS
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
An advanced cross-platform tool for detecting and exploiting SQL injection security flaws
A collection of reverse engineering challenges covering a wide range of topics and difficulty levels.
Powerful debugging tool with extensive features and extensions for memory dump analysis and crash dump analysis.
A PE/COFF file viewer that displays header, section, directory, import table, export table, and resource information within various file types.
A Django web interface for managing Yara rules with features like search, categorization, and bulk edits.
A software reverse engineering framework with full-featured analysis tools and support for multiple platforms, instruction sets, and executable formats.
YARA module for supporting DCSO format bloom filters with hashlookup capabilities.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.