YARA Matches Correspondance Array (YMCA) Logo

YARA Matches Correspondance Array (YMCA)

0
Free
Visit Website

YMCA is a tool designed for threat hunters, incident responders, and security analysts to visually present the correspondences between a YARA ruleset and a collection of samples, focusing exclusively on the strings section of the rules. To use, download and run the standalone binary on Linux or Windows, then access it via localhost:4449. Use cases include gaining a complete view of the coverage of a new rule and reviewing the accuracy of an existing rule at the start of a new campaign.

FEATURES

ALTERNATIVES

DNSDumpster is a domain research tool for discovering and analyzing DNS records to map an organization's attack surface.

A tool to extract indicators of compromise from security reports in PDF format.

Sigma is a generic and open signature format for SIEM systems and other security tools to detect and respond to threats.

Provides indicators of compromise (IOCs) to combat malware with Yara and Snort rules.

Threat hunting tool leveraging Windows events for identifying outliers and suspicious behavior.

ThreatMiner is a threat intelligence portal that aggregates data from various sources and provides contextual information related to indicators of compromise (IOCs).

Collect various intelligence sources for hosts in CSV format.

A serverless application for creating and monitoring URL tokens with threat intelligence and customizable alerts.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved