YARA Logo

YARA

0
Free
Updated 11 March 2025
Visit Website

YARA is a tool aimed at helping malware researchers to identify and classify malware samples by creating descriptions of malware families based on textual or binary patterns through rules consisting of strings and boolean expressions. It allows for the creation of complex rules using wild-cards, case-insensitive strings, regular expressions, and special operators.

FEATURES

SIMILAR TOOLS

OCaml wrapper for YARA matching engine for malware identification

Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.

An advanced cross-platform tool for detecting and exploiting SQL injection security flaws

A collection of reverse engineering challenges covering a wide range of topics and difficulty levels.

Powerful debugging tool with extensive features and extensions for memory dump analysis and crash dump analysis.

A PE/COFF file viewer that displays header, section, directory, import table, export table, and resource information within various file types.

A Django web interface for managing Yara rules with features like search, categorization, and bulk edits.

A software reverse engineering framework with full-featured analysis tools and support for multiple platforms, instruction sets, and executable formats.

YARA module for supporting DCSO format bloom filters with hashlookup capabilities.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved