YARA is an ancronym for: YARA: Another Recursive Ancronym, or Yet Another Ridiculous Acronym. Pick your choice.
👀- Actively maintained, a repository worth watching. 💎- Novel, interesting, educational, or otherwise stand-out content. ✨- Added more recently, shiny new toys. 🏆- The biggest collection award, awarded to a single repo.
- AlienVault Labs Rules
- Collection of tools, signatures, and rules from the researchers at AlienVault Labs. Search the repo for .yar and .yara extensions to find about two dozen rules ranging from APT detection to generic sandbox / VM detection. Last updated in January of 2016.
- Apple OSX
- Apple has ~40 YARA signatures for detecting malware on OSX. The file, XProtect.yara, is available locally at /System/Library/CoreServices/XProtect.bundle/Contents/Resources/.
- bamfdetect rules
- Custom rules from Brian Wallace used for bamfdetect, along with some rules from other sources.
- bartblaze YARA rules
- Collection of personal YARA rules
- BinaryAlert YARA Rules
- A couple dozen rules written and released by AirBnB as part of their BinaryAlert tool (see next section). Detection for hack tools, malware, and ransomware across Linux, Window, and OS X. This is a new and active project.
- Burp YARA Rules
- Collection of YARA rules intended to be used with the Burp Proxy through the Yara-Scanner extension. These rules focus mostly on non-exe malware typically delivered over HTTP including HTML, Java, Flash, Office, PDF, etc. Last updated in June of 2016.
- Find a common pattern of bytes within a set of samples and generate a YARA rule from the identified pattern.
- CAPE Rules
- Rules from various authors bundled with the Config And Payload Extraction Cuckoo Sandbox extension (see next section).
- CDI Rules
- Collection of YARA rules released by CyberDefenses for public use. Built from information in intelligence profiles, dossiers and file work.
- Citizen Lab Malware Signatures
- YARA signatures developed by Citizen Lab. Dozens of signatures covering a variety of malware families. The also inclde a syntax file for Vim. Last update was in November of 2016.
- ConventionEngine Rules
- A collection of Yara rules looking for PEs with PDB paths that have unique, unusual, or overtly malicious-looking keywords, terms, or other features.
- Deadbits Rules
- A collection of YARA rules made public by Adam Swanda, Splunk's Principal Threat Intel. Analyst, from his own recent malware research.
- Didier Stevens Rules
- Collection of rules from Didier Stevens, author of a suite of tools for inspecting OLE/RTF/PDF. Didier's rules are worth scrutinizing and are generally written purposed towards hunting. New rules are frequently announced through the NVISO Labs Blog.
- ESET IOCs
- Collection of YARA and Snort rules from IOCs collected by ESET researchers. There's about a dozen YARA Rules to glean from in this repo, search for file extension .yar. This repository is seemingly updated on a roughly monthly interval. New IOCs are often mentioned on the ESET WeLiveSecurity Blog.
- Fidelis Rules
- You can find a half dozen YARA rules in Fidelis Cyber's IOC repository. They update this repository on a roughly quarterly interval. Complete blog content is also available in this repository.
- FireEye Red Team countermeasures detection
- Florian Roth Rules
- Florian Roth's signature base is a frequently updated collection of IOCs and YARA rules that cover a wide range of threats. There are dozens of rules which are actively maintained. Watch the repository to see rules evolve over time to address false potives / negatives.
- Florian Roth's IDDQD Rule
- A proof-of-concept rule that shows how easy it actually is to detect red teamer and threat group tools and code.
- f0wl yara_rules
- A collection of Yara rules from https://dissectingmalwa.re/ blog posts.
- Franke Boldewin Rules
- A collection of YARA Rules from @r3c0nst.
- FSF Rules
- Mostly filetype detection rules, from the EmersonElectricCo FSF project (see next section).
- GoDaddy ProcFilter Rules
- A couple dozen rules written and released by GoDaddy for use with ProcFilter (see next section). Example rules include detection for packers, mimikatz, and specific malware.
- h3x2b Rules
- Collection of signatures from h3x2b which stand out in that they are generic and can be used to assist in reverse engineering. There are YARA rules for identifying crypto routines, highly entropic sections (certificate discovery for example), discovering injection / hooking functionality, and more.
- Icewater Rules
- Repository of automatically generated YARA rules from Icewater.io. This repository is updated rapidly with newly generated signatures that mostly match on file size range and partial content hashes.
- imp0rtp3's Rules
- A small repository which contains some browser based rules.
- Intezer Rules
- YARA rules published by Intezer Labs.
- InQuest Rules
- YARA rules published by InQuest researchers mostly geared towards threat hunting on Virus Total. Rules are updated as new samples are collected and novel pivots are discovered. The InQuest Blog will often discuss new findings.
- jeFF0Falltrades Rules
- A collection of YARA signatures for various malware families.
- kevthehermit Rules
- Dozens of rules from the personal collection of Kevin Breen. This repository hasn't been updated since February of 2016.
- Koodous Community Rules
- Community-contributed rules for Android APK malware.
- Loginsoft Rules
- Yara Rules for Detecting Malicious Documents targeting Microsoft Office format.
- Ruleset for scanning Linux servers for shells, spamming, phishing and other webserver baddies.
- NCC Group Rules
- A handful of YARA rules released by NCC Group's Cyber Defence team.
- Malice.IO YARA Plugin Rules
- Collection of topical from a variety of sources for the YARA component of the Malice.IO framework.
- Malpedia Auto Generated Rules
- A zip file that contains all automatically generated, code-based rules created using Malpedia's YARA-Signator
- Malpedia Auto Generated Rules Repo
- Repository to simplify access to and synchronization of Malpedia's automatically generated, code-based YARA rules.
- McAfee Advanced Threat Research IOCs
- IOCs, including YARA rules, to accompany McAfee ATR's blog and other public posts.
- McAfee Advanced Threat Research Yara-Rules
- Repository of YARA rules made by McAfee ATR Teams.
- mikesxrs YARA Rules Collection
- Large collection of open source rules aggregated from a variety of sources, including blogs and other more ephemeral sources. Over 100 categories, 1500 files, 4000 rules, and 20Mb. If you're going to pull down a single repo to play with, this is the one.
- Patrick Olsen Rules
- Small collection of rules with a wide footprint for variety in detection. RATs, documents, PCAPs, executables, in-memory, point-of-sale malware, and more. Unfortunately this repository hasn't seen an update since late 2014.
- QuickSand Lite Rules
- This repo contains a C framework and standalone tool for malware analysis, along with several useful YARA rules developed for use with the project.
- Triage suspect systems and hunt for Indicators of Compromise (IOCs) across thousands of endpoints in minutes.
- ReversingLabs YARA Rules
- A collection of yara rules published by ReversingLabs which covers exploits, infostealers, ransomeware, trojans, and viruses.
- Securitymagic's YARA Rules
- YARA rules for a variety of threats.
- Sophos AI YaraML Rules
- A repository of Yara rules created automatically as translations of machine learning models. Each directory will have a rule and accompanying metadata: hashes of files used in training, and an accuracy diagram (a ROC curve).
- SpiderLabs Rules
- Repository of tools and scripts related to malware analysis from the researchers at SpiderLabs. There's only three YARA rules here and the last update was back in 2015, but worth exploring.
- StrangeRealIntel's Daily IOCs
💎 ✨ 👀
- Regularly updated YARA rules covering a variety of fresh threats.
- t4d's PhishingKit-Yara-Rules
- This repository, dedicated to Phishing Kits zip files YARA rules, is based on zip raw format analysis to find directories and files names, you don't need yara-extend there.
- Telekom Security Malare Analysis Repository
- This repository comprises scripts, signatures, and additional IOCs of our blog posts at the telekom.com blog.
- Tenable Rules
- Small collection from Tenable Network Security.
- TjadaNel Rules
- Small collection of malware rules.
- VectraThreatLab Rules
- YARA rules for identifying anti-RE malware techniques.
- Volexity - Threat-Intel
- This repository contains IoCs related to Volexity public threat intelligence blog posts.
- x64dbg Signatures
- Collection of interesting packer, compiler, and crypto identification signatures.
- YAIDS is a Multi-Threaded Intrusion Detection System using Yara. YAIDS supports all valid Yara rules (including modules) and any PCAP compatible data stream (Network, USB, Bluetooth, etc.).
- Collection of file type identfiying rules.
- Rules to identify files containing juicy information like usernames, passwords etc.
- YaraRules Project Official Repo
- Large collection of rules constantly updated by the community.
- Rules created for the Unprotect Project for detecting malware evasion techniques.
- AirBnB BinaryAlert
- Open-source serverless AWS pipeline where any file uploaded to an S3 bucket is immediately scanned with a configurable set of YARA rules.
- YARA module that integrates APK analysis.
- Arya- The Reverse YARA
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA because it does exactly the opposite - it creates files that matches your rules.
- Audit Node Modules With YARA Rules
- Run a given set of YARA rules against the given node_module folder
- Automated Yara Rule generation using Biclustering
- Identifies and extracts information from bots and other malware.
- Generate YARA rules to match terms against base64-encoded data.
- CAPE: Config And Payload Extraction
- Extension of Cuckoo specifically designed to extract payloads and configuration from malware. CAPE can detect a number of malware techniques or behaviours, as well as specific malware families, from its initial run on a sample. This detection then triggers a second run with a specific package, in order to extract the malware payload and possibly its configuration, for further analysis.
- YARA rule metadata specification and validation utility.
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets.
- Cloudina Security Hawk
- Multi Cloud antivirus scanning API based on CLAMAV and YARA for AWS S3, AZURE Blob Storage, GCP Cloud Storage.
- CrowdStrike Feed Management System
- Framework for automating collection and processing of samples from VirusTotal, and executing commands based on YARA rule matches.
- CSE-CST AssemblyLine
- The Canadian Communications Security Establishment (CSE) open sourced AssemblyLine, a platform for analyzing malicious files. The component linked here provides an interface to YARA.
- A multi-platform .NET wrapper library for the native YARA library.
- Event Log Analysis Tool that creates/uses YARA rules for Windows event log analysis.
- Emerson File Scanning Framework (FSF)
- Modular, recursive file scanning solution.
- MS Exchange transport agent uses YARA to detect malware in email messages.
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a running operating system.
- Fast customisable cross-platform suspicious file finder. Designed for incident response. Supports md5/sha1/sha256 hashs, litteral/wildcard strings, regular expressions and YARA rules. Can easily be packed to be deployed on any windows / linux host.
- findcrypt-yara and FindYara
- IDA pro plugins to scan your binary with YARA rules to find crypto constants (and more).
- Pattern extractor for obfuscated code.
- Parser with YARA support, to extract meta information, perform static analysis and detect macros within files.
- GoDaddy ProcFilter
- ProcFilter is a process filtering system for Windows with built-in YARA integration. YARA rules can be instrumented with custom meta tags that tailor its response to rule matches. It runs as a Windows service and is integrated with Microsoft's ETW API, making results viewable in the Windows Event Log. Installation, activation, and removal can be done dynamically and does not require a reboot.
- Go bindings for YARA.
- Halogen is a tool to automate the creation of yara rules against image files embedded within a malicious document.
- IDA Pro, Cutter, and BinaryNinja plugin that provides easy creation of YARA rules for ASCII & hex strings between a given start and end address.
- IDA Python scripts for generating YARA sigs from executable opcodes (.NET included).
- Scan data within an IDB using YARA.
- IDA processor for compiled YARA rules.
- InQuest ThreatKB
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL).
- Advanced Indicator of Compromise (IOC) extractor, with YARA rule extraction.
- Powershell scripts to run YARA on remote machines.
- A minimal library to generate YARA rules from JAVA
- Distributed system written in Python, allows researchers to scan one or more YARA rules over collections with samples.
- Laika BOSS
- Object scanner and intrusion detection system that strives to achieve the following goals: Scalable, Flexible, Verbose.
- .NET wrapper for libyara built in C++ CLI used to easily incorporate yara into .NET projects
- Hexadecimal editor, disassembler and decompiler for malware analysis. Embeds both a YARA scanner and rule editor for easy in-app rule creation. Free and paid versions are available.
- MalConfScan is a Volatility plugin extracts configuration data of known malware. This tool searches for malware in memory images and dumps configuration data. In addition, this tool has a function to list strings to which malicious code refers.
- Scan process memory for YARA matches and execute Python scripts if a match is found.
- MISP Threat Sharing
- Threat intelligence platform including indicators, threat intelligence, malware samples and binaries. Includes support for sharing, generating, and validating YARA signatures.
- MITRE MultiScanner
- File analysis framework that assists the user in evaluating a set of files by automatically running a suite of tools for the user and aggregating the output.
- Generate YARA rules based on binary code.
- Web frontend for running blazingly fast YARA queries on large datasets.
- Nextron Systems OSS and Commercial Tools (Florian Roth: @Neo23x0)
- YARA support for Node.js.
- OCaml bindings to libyara
- Performs OCR on image files and scans them for matches to YARA rules.
- Scan pastebin.com with YARA rules.
- Threat hunting tool for detecting and processing IOCs using YARA under the hood.
- Parse YARA rules with Python.
- Collaborative malware analysis framework with YARA rule matching and other features.
- PwC Cyber Threat Operations rtfsig
- This tool is designed to make it easy to signature potentially unique parts of RTF files.
- Tools for checking samples against Virus Total, including VT_RuleMGR, for managing threat hunting YARA rules.
- Compact C framework to analyze suspected malware documents. Also includes a web interface and online analysis.
- Given a string, create 255 xor encoded versions of that string as a YARA rule.
- Simple, self-contained YARA-based file IOC scanner.
- Analyze deeply embedded files (doc, pdf, exe, ...) with clamscan and YARA.
- Modular and highly customizable framework for the creation of data sets from multiple disparate data sources.
- Detection-Oriented File Analysis System built on Python3, ZeroMQ, and YARA, primarily used for threat detection/hunting and intelligence gathering.
- Sysmon EDR
- YARA scanning, process killing, network blocking, and more.
- Microsoft WinDbg extension which includes the ability to use YARA rules to hunt processes in memory.
- Automatically extract and aggregate IOCs including YARA rules from many sources.
- The missing UI to Apple's built-in XProtect YARA signatures. Enumerate signatures, scan files, and more.
- Yara rule generator using VirusTotal code similarity feature
code-similar-to:written by @arieljt.
- Yara rule generator using VirusTotal code similarity feature
- Automatically generate AV byte signatures from sets of similar binaries.
- Creates YARA signatures from executable code within malware.
- Generate bulk YARA rules from YAML input.
- YARA-CI helps you to keep your YARA rules in good shape. It can be integrated into any GitHub repository containing YARA rules and it will run automated tests every time you make some change.
- Tool useful for incident response as well as anti-malware enpoint based on YARA signatures.
- .Net Library designed to make it easier to check potentially malicious files and archives using YARA and make a decision about their harmfulness based on the weights of the detected rules.
- Yara Finder
- Web API and docker image for scanning files against YARA rules, built on @tylerha97's yara_scan.
- Quick, simple, and effective yara rule creation to isolate malware families and other malicious objects of interest.
- YaraGen and yara_fn
- Plugins for x64dbg and IDAPython, respectively, that generate YARA rules from function blocks.
- Django web interface for managing YARA rules.
- Java bindings for YARA.
- YARA scanner for IMAP feeds and saved streams.
- Yara Malware Quick menu scanner
- Adds the awsome YARA pattern scanner to Windows right click menus.
- Web based manager for YARA rules.
- Yaramanager (PyPI)
- Command line tool to manage and organize your Yara ruleset.
- A library that provides parsing of YARA rules into AST and a C++ programming interface to build new YARA rulesets.
- YARA rule set coverage analyzer.
- OCaml bindings for YARA
- Tools for parsing rulesets using the exact grammar as YARA. Written in Go.
- YARA scanner For IMAP feeds and saved streams.
- Python extension to wrap the YARA process memory access API.
- Rust bindings for VirusTotal/Yara
- Automatic YARA rule generation for Malpedia
- Aggregate files into collections basd on YARA rules. blog
- Yara Python ICAP Server
- ICAP server with YARA scanner.
- Automatic generation of function signature using machine learning.
- Python-based extension that integrates a YARA scanner into Burp Suite.
- Golang-based web service to scan files with YARA rules.
- This script allows you to scan multiple remote nodes using PsExec and native OS commands.
- C# wrapper around the Yara pattern matching library
- Python bindings to author YARA rules using natural Python conventions.
- Validates YARA rules and tries to repair the broken ones.
- Scan files with Yara and send rule matches to VirusTotal reports as comments.
- Search for strings inside a zip file.
- IDAPython plugin for gerenating YARA rules from x86/x86-64 code.
- YARA rule generator for finding related samples and hunting.
- Yara Scan
- Place to upload files and scan with internal rules.
- Yara Scanner
- A wrapper around the yara-python project the providing multiple capabilities.
- A Semi automatic handy tool to generate YARA rules from sample virus files ( WIP ) for Malware Analyst, inspired by DIFF function of VirusTotal Premium Account.
- Automatically curate open source yara rules and run scans.
- YARA rule generator for Android malware.
- Platform meant to organize observables, indicators of compromise, TTPs, and knowledge on threats in a single, unified repository.
- YARA integrated software to handle archive file data.
- Scans files with YARA rules and send email alerts which include network context of the file transfer and attaches the suspicious file if it is less than 10 MB.
- Parsing tool for Yara Scan Service's JSON output file.
- Displays a table of matches between YARA rules and a collection of samples.
- Yobi is a basic firefox extension which allows to run public or private YARA rules on all scripts and pages rendered by the browser.
- Strings statistics calculator for YARA rules.
- Hybrid Analysis YARA Search
- YARA search / hunting from CrowdStrike / Hybrid Analysis, powered by Falcon MalQuery.
- InQuest Labs
- See the YARA section for helper routines to convert regular expressions to match on base64 encoded strings, conver strings to sequences of uint() lookups, and more.
- Collaborative platform for APK analysis, with community YARA rule repository and large APK sample dataset.
- Free malware repository providing researchers access to samples, malicous feeds, and YARA results.
- Extract IOCs from Remote Access Trojans.
- YaraEditor (Web)
- All-in-one website to create and manage YARA rules.
- YARAify is a project from abuse.ch that allows anyone to scan suspicious files such as malware samples or process dumps against a large repository of YARA rules.
- Yara Share
- Free repository and online community for users to upload and share Yara rules.
- Yara Scan Service
- A simple service to test your Yara rules against a large set of malicious and identified files.
- Atom: language-yara
- Emacs: yara-mode
- GTK-based editors, like gedit and xed: GtkSourceView-YARA
- Notepad++: userDefinedLanguages
- Sublime Text: YaraSyntax
- Vim: vim-yara, vim-syntax-yara
- Visual Studio Code: vscode-yara
We're aggregating the Twitter handles for anyone involved with the projects on this page into a single list: awesome-yara Twitter list. Do let us know if anyone is missing.
Related Awesome Lists
- CVE PoC
- Malware Analysis
- ML for Cyber Security
- PCAP Tools
- Static Analysis
- Threat Detection
- Threat Intelligence
This list is maintained by InQuest. Feel free to let us know about anything we're missing!