Yara is the pattern matching swiss knife for malware researchers (and everyone else). Basically Yara allows us to scan files based on textual or binary patterns, thus we can take advantage of Yara's potential and focus it in forensic investigations. The repository is split into two folders: file and raw. The rules in the file folder are mainly to look for magic in standalone files, while rules inside the raw folder are mainly to look for magic in raw files or dump files. The main difference is the offset of the magic, usually at 0x0 in files. Contribution guidelines are available in CONTRIBUTING.md.
FEATURES
SIMILAR TOOLS
A collaborative forensic timeline analysis tool for organizing and analyzing data with rich annotations and comments.
A library and tools for accessing and analyzing Linux Logical Volume Manager (LVM) volume system format.
A comprehensive Linux log analysis tool that streamlines the investigation of security incidents by extracting and organizing critical details from supported log files.
An open source digital forensic tool for processing and analyzing digital evidence with high performance and multiplatform support.
A library for working with Windows NT data types, providing access and manipulation functions.
A reverse engineering tool that extracts and organizes Samsung ODIN3 protocol messages from USB packet captures into human-readable files.
A comprehensive guide to incident response and computer forensics, covering the entire lifecycle of incident response and remediation.
A utility for recovering deleted files from ext3 or ext4 partitions.
LiME is a Linux Memory Extractor tool for acquiring volatile memory from Linux and Linux-based devices, including Android, with features like full memory captures and minimal process footprint.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.