Bindings for the Yara library from VirusTotal. More documentation can be found on the Yara's documentation. Example The implementation is inspired from yara-python. const RULES: &str = r#" rule contains_rust { strings: $rust = "rust" nocase condition: $rust } "#; fn main() { let compiler = Compiler::new().unwrap(); let compiler = compiler .add_rules_str(RULES) .expect("Should have parsed rule"); let rules = compiler .compile_rules() .expect("Should have compiled rules"); let results = rules .scan_mem("I love Rust!".as_bytes(), 5) .expect("Should have scanned"); assert!(results.iter().any(|r| r.identifier == "contains_rust")); } Features Support from Yara v4.2. Compile rules from strings or files. Save and load compiled rules. Scan byte arrays (&[u8]) or files. Feature flags and Yara linking. Look at the yara-sys crate documentation for a list of feature flags and how to link to your Yara crate. TODO Remove some unwrap on string conversions (currently this crate assume the rules, meta and namespace identifier are valid Rust's str). Accept AsRef<Path> instead of &str on multiple functions. Implement the scanner API. Add process scanning. Report the warnings to the user. Lic
FEATURES
SIMILAR TOOLS
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.
An open source .NET deobfuscator and unpacker that restores packed and obfuscated assemblies by reversing various obfuscation techniques.
Joe Sandbox Community provides automated cloud-based malware analysis across multiple OS platforms.
Code to prevent a managed .NET debugger/profiler from working.
Valkyrie is a sophisticated file verdict system that enhances malware detection through behavioral analysis and extensive file feature examination.
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
A static analysis tool for PE files that identifies potential malicious indicators through compiler detection, packing analysis, signature matching, and suspicious string identification.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.