YARA Matches Correspondance Array (YMCA) Logo

YARA Matches Correspondance Array (YMCA)

0
Free
Updated 11 March 2025
Visit Website

YMCA is a tool designed for threat hunters, incident responders, and security analysts to visually present the correspondences between a YARA ruleset and a collection of samples, focusing exclusively on the strings section of the rules. To use, download and run the standalone binary on Linux or Windows, then access it via localhost:4449. Use cases include gaining a complete view of the coverage of a new rule and reviewing the accuracy of an existing rule at the start of a new campaign.

FEATURES

SIMILAR TOOLS

A Splunk app mapped to MITRE ATT&CK to guide threat hunts.

Akamai Hunt is a managed threat hunting service that detects and remediates evasive security risks in network environments using data analysis, AI, and expert investigation.

A repository of freely usable Yara rules for detection systems, with automated error detection workflows.

A reference implementation for collecting events and performing CAR analytics to detect potential adversary activity.

A daily updated summary of security advisories from various sources

QRadio is a tool/framework designed to consolidate cyber threats intelligence sources.

Darkscope is an AI-powered threat intelligence platform that uses virtual personas to monitor the dark web, social media, and deep web for cyber threats and security risks targeting organizations.

A daily collection of IOCs from various sources, including articles and tweets.

A threat intelligence dissemination layer for open-source security tools with STIX-2 support and plugin-based architecture.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved