YaraHunter Logo

YaraHunter

YaraHunter scans container images, running Docker containers, and filesystems using YARA rules to detect malware indicators and signs of compromise.

1,324
Visit website
Claim and verify your listing
0

YaraHunter Description

YaraHunter is a malware detection tool that scans container images, running Docker containers, and filesystems using YARA rulesets to identify indicators of malware and potential compromises. The tool operates across multiple deployment scenarios: - Build-and-test environments: integrates into CI/CD pipelines to scan build artifacts for malware indicators - At-rest scanning: examines local container images before deployment to verify they are free from malware - Runtime scanning: monitors running Docker containers when unusual network traffic or CPU activity is detected - Filesystem scanning: performs on-demand scans of local filesystems for indicators of compromise Key technical capabilities include scanning both running and static containers, filesystem analysis, and CI/CD integration support. The tool is packaged as a portable Docker container and provides JSON output for automated processing and integration with other security tools. YaraHunter is designed for integration into the ThreatMapper threat discovery platform and supports automated deployment scenarios through its standardized output format.

YaraHunter FAQ

Common questions about YaraHunter including features, pricing, alternatives, and user reviews.

YaraHunter is YaraHunter scans container images, running Docker containers, and filesystems using YARA rules to detect malware indicators and signs of compromise.. It is a Security Operations solution designed to help security teams with Threat Detection, Malware, Docker.

Have more questions? Browse our categories or search for specific tools.

FEATURED

Heeler Application Security Auto-Remediation Logo

Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

Mandos Fractional CISO Logo

Fractional CISO services for B2B companies to build security programs

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

13
OSINTLeak Real-time OSINT Leak Intelligence Logo

Real-time OSINT monitoring for leaked credentials, data, and infrastructure

8
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

6
Mandos Brief Logo

Weekly cybersecurity newsletter covering security incidents, AI, and leadership

6
TestSavant AI Security Assurance Platform Logo

AI security assurance platform for red-teaming, guardrails & compliance

5
View Popular Tools →

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox