Yaramod is a library that provides parsing of YARA rules into AST and a C++ programming interface to build new YARA rulesets. This project is not associated with the YARA project. Yaramod also comes with Python bindings and this repository should be fully compatible with installation using pip. User Documentation: You can find our documentation on Read the Docs. API Documentation: You can generate the API documentation by yourself. Pass -DYARAMOD_DOCS=ON to cmake and run make doc. License: Copyright (c) 2017 Avast Software, licensed under the MIT license. See the LICENSE file for more details. Yaramod uses third-party libraries or other resources listed, along with their licenses, in the LICENSE-THIRD-PARTY file. Contributing: See RetDec contribution guidelines.
Common questions about yaramod including features, pricing, alternatives, and user reviews.
yaramod is Yaramod is a library for parsing YARA rules into AST and building new YARA rulesets with C++ programming interface. It is a Security Operations solution designed to help security teams with Parser, Rule Engine, YARA.
yaramod is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/avast/yaramod/ for download and installation instructions.
Popular alternatives to yaramod include:
Compare these tools and more at https://cybersectools.com/categories/security-operations
yaramod is for security teams and organizations that need Parser, Rule Engine, YARA. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
A Go library for manipulating YARA rulesets with the ability to programatically change metadata, rule names, and more.
Malware scanning tool for DFIR using 40+ engines from ReversingLabs
Malware analysis platform for SOC teams with binary analysis and threat detection