yara-parser is a Go library for manipulating YARA rulesets. Its key feature is that it uses the same grammar and lexer files as the original libyara to ensure that lexing and parsing work exactly like YARA. The grammar and lexer files have been modified to fill Go data structures for ruleset manipulation instead of compiling rulesets for data matching. Using yara-parser, one will be able to read YARA rulesets to programatically change metadata, rule names, rule modifiers, tags, strings, and more. The ability to serialize rulesets to JSON for rule manipulation in other languages is provided with the y2j tool. Similarly, j2y provides JSON-to-YARA conversion, but do see Limitations below. Installation For the following go get commands, if you experience any issues, they are likely due to outdated versions of Go. The project uses features introduced in Go 1.10. Installation should proceed normally after an update. To install (or update) everything at once, the following command can be used: go get -u github.com/Northern-Lights/yara-parser/... y2j: YARA to JSON Use the following command to install the y2j command for converting YARA rulesets to JSON. go get -u github.com/Nor
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
An open-source binary debugger for Windows with a comprehensive plugin system for malware analysis and reverse engineering.
A collection of resources for beginners to learn assembly language.
A tool for deep analysis of malicious files using ClamAV and YARA rules, with features like scoring suspect files, building visual tree graphs, and extracting specific patterns.
A native Python cross-version decompiler and fragment decompiler.
A fast and simple DOM based XSS vulnerability scanner
TeamTNT is modifying its malicious shell scripts after they were made public by security researchers.