yaraScanParser Logo

yaraScanParser

0
Free
Visit Website

This script is a parsing tool for Yara Scan Service's JSON output file. Yara Scan Service allows to quickly test your YARA rule against a large collection of malicious samples. It helps assure your rule only matches the malware family you are looking for. The output is a JSON file containing all the matched samples. The JSON file contains a lot of information, and yaraScanParser is meant to help you maximize its benefits. yaraScanParser allows you to: - Save time by parsing the Yara Scan Service results automatically - Get information about wanted matches and false positives of your rule - Get the matched files' hash values in a format that can be easily inserted to your Yara rule's metadata section

FEATURES

ALTERNATIVES

A Python library for interacting with TAXII servers

A free software that calculates the security ranking of Internet Service Providers to detect malicious activities.

QRadio is a tool/framework designed to consolidate cyber threats intelligence sources.

A collection of Yara rules licensed under the DRL 1.1 License.

A project sharing malicious URLs used for malware distribution to help protect networks.

Python-based client for IBM XForce Exchange with an improved version available.

Real-time monitoring tool for newly issued SSL certificates.

A framework for managing cyber threat intelligence in structured formats.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved