yarAnalyzer Logo

yarAnalyzer

0
Free
Updated 11 March 2025
Visit Website

yarAnalyzer creates statistics on a yara rule set and files in a sample directory. Place some signatures with .yar extension in the 'signatures' folder and then run yarAnalyzer on a certain sample directory like: yarAnalyzer.py -p /sample/path -s /signatures. It will generate two tables as command line output and two CSV files (yaranalyzer_file_stats.csv, yaranalyzer_rule_stats.csv). A new feature is the inventory creation. yarAnalyzer.py --inventory -s /signatures. This will create a CSV file named yara-rule-inventory.csv (default, set with '-o') with information about the initialized rules (Rule File;Rule Name;Description;Reference). Screenshots, Rule Statistics, File Statistics, CSV Output in Excel.

FEATURES

SIMILAR TOOLS

Threat intelligence platform providing real-time threat data and insights.

A platform providing an activity feed on exploited vulnerabilities.

A summary of the threat modeling posts and final thoughts on the process

A curated list of resources for learning about deploying, managing, and hunting with Microsoft Sysmon.

Python-based client for IBM XForce Exchange with an improved version available.

Silent Push Platform provides preemptive cyber defense by identifying malicious infrastructure before attacks are launched using Indicators of Future Attack (IOFA)™ technology.

A cybersecurity tool with online demo, mailing list, and multiple installation methods.

A free software that calculates the security ranking of Internet Service Providers to detect malicious activities.

LOKI is a simple IOC and YARA Scanner for Indicators of Compromise Detection.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

Copyright © 2025 - All rights reserved