YARA Matches Correspondance Array (YMCA) Logo

YARA Matches Correspondance Array (YMCA)

0
Free
Visit Website

YMCA is a tool designed for threat hunters, incident responders, and security analysts to visually present the correspondences between a YARA ruleset and a collection of samples, focusing exclusively on the strings section of the rules. To use, download and run the standalone binary on Linux or Windows, then access it via localhost:4449. Use cases include gaining a complete view of the coverage of a new rule and reviewing the accuracy of an existing rule at the start of a new campaign.

FEATURES

ALTERNATIVES

A community-driven list of sample security analytics for auditing cloud usage and detecting threats in Google Cloud.

Acapulco is a Splunk application that automatically generates meta-events from hpfeeds channels and visualizes them using D3.js.

LOKI is a simple IOC and YARA Scanner for Indicators of Compromise Detection.

Python-based client for IBM XForce Exchange with an improved version available.

Threat intelligence platform providing real-time threat data and insights.

A minimalistic Java library for representing threat model data in a normalized way and automating threat intelligence extraction.

A tool to extract indicators of compromise from security reports in PDF format.

Powershell Threat Hunting Module for scanning remote endpoints and collecting comprehensive information.

PINNED