Analyze Android APK files from a browser.
-
Updated
Sep 29, 2020 - HTML
Analyze Android APK files from a browser.
The YARA-Scanner application is a web-based tool that allows you to scan uploaded files against YARA rules to detect specific patterns or signatures in the files.
Ansible role - Build and install yara from source
Simple tool to automatically create Yara rules that map a binary file
Simple IOC and YARA scanner for Linux®
Scan files with Yara and send rule matches to VirusTotal reports as comments
Scan and retrieve IoCs from malware samples for incident response
windows apps analysis toolkit
S_yara-ruleset is based on Web Malwares (Open Source)
A yara scanner detecting malwares using yara rules
Flask App that scans files against Yara
A Slack App (AWS Lambda) for detecting and notifying on secret disclosure
Yara io scanning library for Golang
The pattern matching swiss knife
Multi Cloud Antivirus Scanning API using YARA and CLAMAV for AWS S3, Azure Blob Storage and GCP Cloud Storage
Audit Node Module folder with YARA rules to identify possible malicious packages hiding in node_moudles
Multi-threaded Yara-based process memory scanner for *nix systems.
Aegis - Flask web interface for scanning files with YARA
A malware scanner with Yara and ClamAV binding
THAMARA - Threat Hunting with AMSI and YARA
Add a description, image, and links to the yara-scanner topic page so that developers can more easily learn about it.
To associate your repository with the yara-scanner topic, visit your repo's landing page and select "manage topics."