YARA Matches Correspondance Array (YMCA) Logo

YARA Matches Correspondance Array (YMCA)

0
Free
Visit Website

YMCA is a tool designed for threat hunters, incident responders, and security analysts to visually present the correspondences between a YARA ruleset and a collection of samples, focusing exclusively on the strings section of the rules. To use, download and run the standalone binary on Linux or Windows, then access it via localhost:4449. Use cases include gaining a complete view of the coverage of a new rule and reviewing the accuracy of an existing rule at the start of a new campaign.

FEATURES

ALTERNATIVES

CRITs is an open source malware and threat repository for collaborative threat defense and analysis.

LOKI is a simple IOC and YARA Scanner for Indicators of Compromise Detection.

Automatic YARA rule generator based on Koodous reports with limited false positives.

A comprehensive Threat Intelligence Program Management Solution for managing the entire CTI lifecycle.

AbuseHelper is an open-source framework for receiving and redistributing abuse feeds and threat intel.

A digital risk protection platform that combines threat intelligence, dark web monitoring, attack surface management, brand protection, and supply chain intelligence to detect and respond to external cyber threats.

An IOC tracker written in Python that queries Google Custom Search Engines for various cybersecurity indicators and monitors domain status using Google Safe Browsing APIs.

Maldatabase is a threat intelligence platform providing malware datasets and threat intelligence feeds for malware data science and threat intelligence.

PINNED