Yara-Java Logo

Yara-Java

0
Free
Visit Website

Does not require yara to be deployed (embeds all needed native dependencies). Supports two modes of operation: External: yara binary extracted and executed as a child process, Embedded: yara jnilib runs embedded in the java process. Rules can be loaded as strings, files or archives; for archives will recursively look for and load all yara rule files. Matches are returned with identifier, metadata, and tags. Negate, timeout, and limit supported. Support yara 4.0.2 -- 2021/1/17. How to build: Get and build yara source code. Example (building from 4.0.2 version): git clone https://github.com/virustotal/yara.git cd yara git checkout tags/v4.0.2 ./bootstrap.sh ./configure --enable-shared --without-crypto CFLAGS=-fPIC make Get and build yara-java. Example (in 'yara' folder): git clone https://github.com/p8a/yara-java.git cd yara-java mvn clean install Usage and examples: See the unit tests. Notes: After you successfully added some sources you can get the compiled rules using the yr_compiler_get_rules() function. You'll get a pointer to a YR_RULES structure which can be used to scan your data as described in Scanning data. Once yr_compiler_get_rules() is invoked you can not add more sources to

FEATURES

ALTERNATIVES

OWASP Damn Vulnerable Web Sockets (DVWS) is a vulnerable web application for client-server communication with numerous vulnerabilities.

Static application security testing (SAST) tool for scanning source code against security and privacy risks.

FingerprintJS is a client-side browser fingerprinting library that provides a unique visitor identifier unaffected by incognito mode.

Open Redirection Analyzer

A self-managed static code analysis platform that conducts continuous inspection of codebases to identify security vulnerabilities, bugs, and code quality issues.

A comprehensive web application security testing solution that offers built-in vulnerability assessment and management, as well as integration options with popular software development tools.

ARM TrustZone provides a secure execution environment for applications on ARM processors.

OpenRASP directly integrates its protection engine into the application server by instrumentation, providing context-aware protection and detailed stack trace logging.