yaraScanParser Logo

yaraScanParser

0
Free
Visit Website

This script is a parsing tool for Yara Scan Service's JSON output file. Yara Scan Service allows to quickly test your YARA rule against a large collection of malicious samples. It helps assure your rule only matches the malware family you are looking for. The output is a JSON file containing all the matched samples. The JSON file contains a lot of information, and yaraScanParser is meant to help you maximize its benefits. yaraScanParser allows you to: - Save time by parsing the Yara Scan Service results automatically - Get information about wanted matches and false positives of your rule - Get the matched files' hash values in a format that can be easily inserted to your Yara rule's metadata section

FEATURES

ALTERNATIVES

NECOMA focuses on data collection, threat analysis, and developing new cyberdefense mechanisms to protect infrastructure and endpoints.

A platform providing an activity feed on exploited vulnerabilities.

msticpy is a library for InfoSec investigation and hunting in Jupyter Notebooks with extensive functionality for log data analysis, threat intelligence enrichment, and visualization.

Modular Threat Hunting Tool & Framework

Utilize Jupyter Notebooks to enhance threat hunting capabilities by focusing on different threat categories or stages.

A threat intelligence domain/IP/hash threat feeds checker that checks IPVoid, URLVoid, Virustotal, and Cymon.

A visualization tool for threat analysis that organizes APT campaign information and visualizes relations of IOC.

A collection of tools and resources for threat hunters.