Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
-
Updated
Sep 23, 2025 - YARA
Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
yara detection rules for hunting with the threathunting-keywords project
Set of Yara rules for finding files using magics headers
Visually inspect and force decode YARA and regex matches found in both binary and text data with colors. Lots of colors.
C# wrapper around the Yara pattern matching library
Automatic generation of YARA rules from sample files.
A script to collect (the most famous) Yara rules from more than 150 free resources. Free alternative to: https://valhalla.nextron-systems.com/
Audit Node Module folder with YARA rules to identify possible malicious packages hiding in node_moudles
Factual rules are YARA rules to find legitimate software on raw disk acquisition.
An ongoing collection of awesome tools and frameworks, best security software practices, libraries, learning tutorials, frameworks, academic and practical resources about YARA in cybersecurity
YARA rules for malware detection
THAMARA - Threat Hunting with AMSI and YARA
A collection of yara rules that can be used for forensics (non malware) cases but also some other rules
Aegis - Flask web interface for scanning files with YARA
🦠 YARA scans, easy & optimized. Full pipeline from fetching latest rules to extracting flagged artifacts for deeper analysis. Windows & GNU/Linux.
A simple wrapper using interop for Yara-X pattern matching on .NET.
The pattern matching swiss knife
basic yara commands
Add a description, image, and links to the yara-forensics topic page so that developers can more easily learn about it.
To associate your repository with the yara-forensics topic, visit your repo's landing page and select "manage topics."