yara-parser is a Go library for manipulating YARA rulesets. Its key feature is that it uses the same grammar and lexer files as the original libyara to ensure that lexing and parsing work exactly like YARA. The grammar and lexer files have been modified to fill Go data structures for ruleset manipulation instead of compiling rulesets for data matching. Using yara-parser, one will be able to read YARA rulesets to programatically change metadata, rule names, rule modifiers, tags, strings, and more. The ability to serialize rulesets to JSON for rule manipulation in other languages is provided with the y2j tool. Similarly, j2y provides JSON-to-YARA conversion, but do see Limitations below. Installation For the following go get commands, if you experience any issues, they are likely due to outdated versions of Go. The project uses features introduced in Go 1.10. Installation should proceed normally after an update. To install (or update) everything at once, the following command can be used: go get -u github.com/Northern-Lights/yara-parser/... y2j: YARA to JSON Use the following command to install the y2j command for converting YARA rulesets to JSON. go get -u github.com/Nor
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.
A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.
Joe Sandbox Community provides automated cloud-based malware analysis across multiple OS platforms.
A tool that extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.
CAPA is a static analysis tool that detects and reports capabilities in executable files across multiple formats, mapping findings to MITRE ATT&CK tactics and techniques.
A static analysis tool for PE files that identifies potential malicious indicators through compiler detection, packing analysis, signature matching, and suspicious string identification.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.