
A parsing tool for Yara Scan Service's JSON output file to help maximize benefits and automate parsing of Yara Scan Service results.

A parsing tool for Yara Scan Service's JSON output file to help maximize benefits and automate parsing of Yara Scan Service results.
This script is a parsing tool for Yara Scan Service's JSON output file. Yara Scan Service allows to quickly test your YARA rule against a large collection of malicious samples. It helps assure your rule only matches the malware family you are looking for. The output is a JSON file containing all the matched samples. The JSON file contains a lot of information, and yaraScanParser is meant to help you maximize its benefits. yaraScanParser allows you to: - Save time by parsing the Yara Scan Service results automatically - Get information about wanted matches and false positives of your rule - Get the matched files' hash values in a format that can be easily inserted to your Yara rule's metadata section
Common questions about yaraScanParser including features, pricing, alternatives, and user reviews.
yaraScanParser is A parsing tool for Yara Scan Service's JSON output file to help maximize benefits and automate parsing of Yara Scan Service results. It is a Security Operations solution designed to help security teams with YARA.
yaraScanParser is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/Sh3llyR/yaraScanParser/ for download and installation instructions.
Popular alternatives to yaraScanParser include:
Compare all yaraScanParser alternatives at https://cybersectools.com/alternatives/yarascanparser
yaraScanParser is for security teams and organizations that need YARA. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Head-to-head feature, pricing, and rating breakdowns.
Managed Agentic Threat Hunting Service (IOC sweeps and hypothesis based hunting)
Expands a single malware hash into full family visibility via structural analysis.