YARA Public YARA rules is a community-driven collection of detection rules designed to identify and classify malware samples based on specific patterns, strings, and behavioral characteristics. The repository contains rules contributed by cybersecurity researchers, analysts, and practitioners from around the world, covering various malware families, attack techniques, and threat indicators. These rules can be used with the YARA pattern matching engine to scan files, memory dumps, and other data sources for known malicious signatures and suspicious patterns. The collection includes rules for detecting different types of malware such as trojans, ransomware, backdoors, and other malicious software variants. Users can integrate these rules into their security tools, incident response workflows, and malware analysis processes to enhance threat detection capabilities.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A tool that extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
An open-source dynamic analysis framework that intercepts and monitors API calls in Android applications using the Android Substrate framework.
A collaborative malware analysis framework with various features for automated analysis tasks.
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
An open source .NET deobfuscator and unpacker that restores packed and obfuscated assemblies by reversing various obfuscation techniques.
CAPA is a static analysis tool that detects and reports capabilities in executable files across multiple formats, mapping findings to MITRE ATT&CK tactics and techniques.
A sandbox for quickly sandboxing known or unknown families of Android Malware
Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.