yara-rust Logo

yara-rust

Bindings for the Yara library from VirusTotal with support for Yara v4.2 and various features like rule compilation and scanning.

81
Visit website
Compare
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

yara-rust Description

Bindings for the Yara library from VirusTotal. More documentation can be found on the Yara's documentation. Example The implementation is inspired from yara-python. const RULES: &str = r#" rule contains_rust { strings: $rust = "rust" nocase condition: $rust } "#; fn main() { let compiler = Compiler::new().unwrap(); let compiler = compiler .add_rules_str(RULES) .expect("Should have parsed rule"); let rules = compiler .compile_rules() .expect("Should have compiled rules"); let results = rules .scan_mem("I love Rust!".as_bytes(), 5) .expect("Should have scanned"); assert!(results.iter().any(|r| r.identifier == "contains_rust")); } Features Support from Yara v4.2. Compile rules from strings or files. Save and load compiled rules. Scan byte arrays (&[u8]) or files. Feature flags and Yara linking. Look at the yara-sys crate documentation for a list of feature flags and how to link to your Yara crate. TODO Remove some unwrap on string conversions (currently this crate assume the rules, meta and namespace identifier are valid Rust's str). Accept AsRef<Path> instead of &str on multiple functions. Implement the scanner API. Add process scanning. Report the warnings to the user. Lic

yara-rust FAQ

Common questions about yara-rust including features, pricing, alternatives, and user reviews.

yara-rust is Bindings for the Yara library from VirusTotal with support for Yara v4.2 and various features like rule compilation and scanning.. It is a Security Operations solution designed to help security teams with Virus Total, Rule Engine, YARA.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

Stairwell Logo

File analysis & threat intel search engine for SOC and IR teams.

0
Stairwell Variant Discovery Logo

Expands a single malware hash into full family visibility via structural analysis.

0
Detection Content Repository Logo

Repository for detection content with various types of rules and payloads.

0
FireEye Red Team Tool Countermeasures Logo

A set of rules for detecting threats in various formats, including Snort, Yara, ClamAV, and HXIOC.

0
CDI_yara Logo

A collection of YARA rules for public use, built from intelligence profiles and file work.

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox