YARA Matches Correspondance Array (YMCA) Logo

YARA Matches Correspondance Array (YMCA)

0
Free
Visit Website

YMCA is a tool designed for threat hunters, incident responders, and security analysts to visually present the correspondences between a YARA ruleset and a collection of samples, focusing exclusively on the strings section of the rules. To use, download and run the standalone binary on Linux or Windows, then access it via localhost:4449. Use cases include gaining a complete view of the coverage of a new rule and reviewing the accuracy of an existing rule at the start of a new campaign.

FEATURES

ALTERNATIVES

A visualization tool for threat analysis that organizes APT campaign information and visualizes relations of IOC.

An Open Source solution for management of Threat Intelligence at scale, integrating multiple analyzers and malware analysis tools.

Repository of APT-related documents and notes sorted by year.

Open Source Threat Intelligence Collector with plugin-oriented framework.

ThreatMiner is a threat intelligence portal that aggregates data from various sources and provides contextual information related to indicators of compromise (IOCs).

Repository of automatically generated YARA rules from Malpedia's YARA-Signator with detailed statistics.

OpenPhish provides real-time phishing trends, detecting new phishing URLs and targeting various brands.

MISP is an open source threat intelligence platform that enhances threat information sharing and analysis.