Loading...

A collection of YARA rules specifically designed for forensic investigations and malware analysis, providing pattern matching capabilities for files and memory dumps.

A collection of YARA rules specifically designed for forensic investigations and malware analysis, providing pattern matching capabilities for files and memory dumps.
YARA-Forensics is a collection of YARA rules specifically designed for forensic investigations and malware analysis. The repository contains pattern matching rules organized into two main categories: file-based rules for analyzing standalone files and raw-based rules for examining raw files or memory dumps. The tool leverages YARA's pattern matching capabilities to identify textual and binary patterns within files during forensic examinations. File folder rules focus on detecting magic signatures typically found at offset 0x0 in standard files, while raw folder rules target patterns in memory dumps and raw data where magic signatures may appear at different offsets. The repository provides a structured approach to forensic pattern matching, allowing investigators to scan files and memory artifacts for specific indicators. Rules are organized to facilitate different types of forensic analysis scenarios, from individual file examination to bulk memory dump analysis. YARA-Forensics includes contribution guidelines to maintain rule quality and consistency across the repository. The tool serves as a specialized extension of YARA's core functionality, tailored specifically for digital forensics workflows and malware research activities.
Common questions about YARA-Forensics including features, pricing, alternatives, and user reviews.
YARA-Forensics is A collection of YARA rules specifically designed for forensic investigations and malware analysis, providing pattern matching capabilities for files and memory dumps. It is a Security Operations solution designed to help security teams with Binary Analysis, File Analysis, YARA.
A Windows context menu integration tool that scans files and folders for malware patterns, crypto signatures, and malicious documents using Yara rules and PEID signatures.
An OCaml Ctypes wrapper for the YARA matching engine that enables malware identification capabilities in OCaml applications.
A command-line tool that visually displays YARA rule matches, regex matches, and hex patterns in binary data with colored output and configurable context bytes.
Malware analysis platform for SOC teams with binary analysis and threat detection
yextend extends Yara's functionality by automatically handling archived and compressed content inflation, enabling pattern matching on files buried within multiple layers of archives.