This script is a parsing tool for Yara Scan Service's JSON output file. Yara Scan Service allows to quickly test your YARA rule against a large collection of malicious samples. It helps assure your rule only matches the malware family you are looking for. The output is a JSON file containing all the matched samples. The JSON file contains a lot of information, and yaraScanParser is meant to help you maximize its benefits. yaraScanParser allows you to: - Save time by parsing the Yara Scan Service results automatically - Get information about wanted matches and false positives of your rule - Get the matched files' hash values in a format that can be easily inserted to your Yara rule's metadata section
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
Signature-based YARA rules for detecting and preventing threats within Linux, Windows, and macOS systems.
Repository of automatically generated YARA rules from Malpedia's YARA-Signator with detailed statistics.
A library of adversary emulation plans to evaluate defensive capabilities against real-world threats.
Tool for visualizing correspondences between YARA ruleset and samples
Converts OpenIOC v1.0 XML files into STIX Indicators, generating STIX v1.2 and CybOX v2.1 content.
Repository containing IoCs related to Volexity's threat intelligence blog posts and tools.