YaraHunter
YaraHunter scans container images, running Docker containers, and filesystems using YARA rules to detect malware indicators and signs of compromise.

YaraHunter
YaraHunter scans container images, running Docker containers, and filesystems using YARA rules to detect malware indicators and signs of compromise.
YaraHunter Description
YaraHunter is a malware detection tool that scans container images, running Docker containers, and filesystems using YARA rulesets to identify indicators of malware and potential compromises. The tool operates across multiple deployment scenarios: - Build-and-test environments: integrates into CI/CD pipelines to scan build artifacts for malware indicators - At-rest scanning: examines local container images before deployment to verify they are free from malware - Runtime scanning: monitors running Docker containers when unusual network traffic or CPU activity is detected - Filesystem scanning: performs on-demand scans of local filesystems for indicators of compromise Key technical capabilities include scanning both running and static containers, filesystem analysis, and CI/CD integration support. The tool is packaged as a portable Docker container and provides JSON output for automated processing and integration with other security tools. YaraHunter is designed for integration into the ThreatMapper threat discovery platform and supports automated deployment scenarios through its standardized output format.
YaraHunter FAQ
Common questions about YaraHunter including features, pricing, alternatives, and user reviews.
YaraHunter is YaraHunter scans container images, running Docker containers, and filesystems using YARA rules to detect malware indicators and signs of compromise.. It is a Security Operations solution designed to help security teams with Threat Detection, Malware, Docker.
FEATURED
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
POPULAR
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox