yara-parser is a Go library for manipulating YARA rulesets. Its key feature is that it uses the same grammar and lexer files as the original libyara to ensure that lexing and parsing work exactly like YARA. The grammar and lexer files have been modified to fill Go data structures for ruleset manipulation instead of compiling rulesets for data matching. Using yara-parser, one will be able to read YARA rulesets to programatically change metadata, rule names, rule modifiers, tags, strings, and more. The ability to serialize rulesets to JSON for rule manipulation in other languages is provided with the y2j tool. Similarly, j2y provides JSON-to-YARA conversion, but do see Limitations below. Installation For the following go get commands, if you experience any issues, they are likely due to outdated versions of Go. The project uses features introduced in Go 1.10. Installation should proceed normally after an update. To install (or update) everything at once, the following command can be used: go get -u github.com/Northern-Lights/yara-parser/... y2j: YARA to JSON Use the following command to install the y2j command for converting YARA rulesets to JSON. go get -u github.com/Nor
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
yextend extends Yara's functionality by automatically handling archived and compressed content inflation, enabling pattern matching on files buried within multiple layers of archives.
Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.
A .NET assembly debugger and editor that enables reverse engineering and dynamic analysis of compiled .NET applications without source code access.
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
Joe Sandbox Community provides automated cloud-based malware analysis across multiple OS platforms.
CAPA is a static analysis tool that detects and reports capabilities in executable files across multiple formats, mapping findings to MITRE ATT&CK tactics and techniques.
An open-source dynamic analysis framework that intercepts and monitors API calls in Android applications using the Android Substrate framework.