Does not require yara to be deployed (embeds all needed native dependencies). Supports two modes of operation: External: yara binary extracted and executed as a child process, Embedded: yara jnilib runs embedded in the java process. Rules can be loaded as strings, files or archives; for archives will recursively look for and load all yara rule files. Matches are returned with identifier, metadata, and tags. Negate, timeout, and limit supported. Support yara 4.0.2 -- 2021/1/17. How to build: Get and build yara source code. Example (building from 4.0.2 version): git clone https://github.com/virustotal/yara.git cd yara git checkout tags/v4.0.2 ./bootstrap.sh ./configure --enable-shared --without-crypto CFLAGS=-fPIC make Get and build yara-java. Example (in 'yara' folder): git clone https://github.com/p8a/yara-java.git cd yara-java mvn clean install Usage and examples: See the unit tests. Notes: After you successfully added some sources you can get the compiled rules using the yr_compiler_get_rules() function. You'll get a pointer to a YR_RULES structure which can be used to scan your data as described in Scanning data. Once yr_compiler_get_rules() is invoked you can not add more sources to
FEATURES
ALTERNATIVES
Statistical renaming, Type inference, and Deobfuscation tool for JavaScript code.
EvoMaster is an open-source tool that automatically generates system-level test cases for web APIs using AI-driven techniques.
Integrates static APK analysis with Yara and requires re-compilation of Yara with the androguard module.
Snyk Code is a real-time SAST tool that provides secure code analysis and actionable remediation advice to prevent code delays and ensure secure development.
Veracode is an intelligent software security platform that helps developers and security teams secure code, find and fix flaws, and automate remediation.
DECAF++ is a fast whole-system dynamic taint analysis framework with improved performance and elasticity.
A Windows Kernel driver intentionally vulnerable to help improve skills in kernel-level exploitation.
A security feature to prevent unexpected manipulation of fetched resources.
PINNED

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Check Point CloudGuard WAF
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.