
A command-line tool that visually displays YARA rule matches, regex matches, and hex patterns in binary data with colored output and configurable context bytes.

A command-line tool that visually displays YARA rule matches, regex matches, and hex patterns in binary data with colored output and configurable context bytes.
YARALYZER is a command-line tool designed for visual inspection of regex and YARA matches within binary data and text files. The tool displays matched bytes in both hexadecimal and raw Python string representation, along with configurable context bytes before and after each match. The tool supports multiple scanning modes including YARA rule files, arbitrary regular expressions, and YARA hex patterns. Users can scan files against existing YARA definitions, custom regex patterns, or hex patterns without requiring a separate YARA file. YARALYZER provides colored output to enhance readability and allows analysts to examine what happens when different character encodings are applied to matched byte sequences. The tool eliminates the need to manually copy match positions into hex editors by directly displaying the relevant byte content. Installation is available through pipx, and the tool accepts various input formats including PDF files, executables, and binary data. The interface supports pattern matching for malware analysis workflows and binary inspection tasks.
Common questions about YARALYZER including features, pricing, alternatives, and user reviews.
YARALYZER is A command-line tool that visually displays YARA rule matches, regex matches, and hex patterns in binary data with colored output and configurable context bytes. It is a Security Operations solution designed to help security teams with Binary Analysis, File Analysis, YARA.
A Windows context menu integration tool that scans files and folders for malware patterns, crypto signatures, and malicious documents using Yara rules and PEID signatures.
A command-line string extraction utility for digital forensics that supports ASCII and Unicode string extraction from files and directories with pattern matching and filtering capabilities.
A collection of YARA rules specifically designed for forensic investigations and malware analysis, providing pattern matching capabilities for files and memory dumps.
Malware analysis platform for SOC teams with binary analysis and threat detection
yextend extends Yara's functionality by automatically handling archived and compressed content inflation, enabling pattern matching on files buried within multiple layers of archives.