yara
linux-malware-detect
yara | linux-malware-detect | |
---|---|---|
19 | 4 | |
7,679 | 1,117 | |
1.8% | - | |
8.9 | 4.5 | |
3 days ago | 6 months ago | |
C | Shell | |
BSD 3-clause "New" or "Revised" License | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
yara
- Ask HN: Regex on a File or Stream
-
Who does check linux distros of malware - open source
Linux has (free) tools to improve security and detect/remove malware: Lynis,Chkrootkit,Rkhunter,ClamAV,Vuls,LMD,radare2,Yara,ntopng,maltrail,Snort,Suricata...
- Release YARA v4.4.0-rc1 - lnk module
- Release YARA v4.3.0-rc1
- yara - The pattern matching swiss knife for malware researchers (and everyone else)
- Hogy lehet észrevenni, ha valaki bejár a gépedre és adatot visz ki? KRÉTA sztori spin-off
- LNK module for Yara
-
Open source tools and standards to lookup known files
Shameless plug: I wrote a small poc module to use hashlookup's bloom filter in yara (https://github.com/VirusTotal/yara). The idea is to easily discard files that are known to be safe and so to avoid launching thousands of yara rules on a file for nothing. One can also use it to keep track of some files that meet certain conditions for instance. The module can store any string in these filters so I see a lot of useful use-cases for this little thingy :)
- Yara - The pattern matching swiss knife
-
Tasked with building a malware analysis / threat hunting machine . Need feedback
YARA - https://virustotal.github.io/yara/
linux-malware-detect
-
Who does check linux distros of malware - open source
Linux has (free) tools to improve security and detect/remove malware: Lynis,Chkrootkit,Rkhunter,ClamAV,Vuls,LMD,radare2,Yara,ntopng,maltrail,Snort,Suricata...
-
WordPress store customers info getting compromised help
Unfortunately yes. On the plus side, this will help ensure they can't get in again. One more thing to add that list... You can use maldet to check for malware/compromised files. It's not the best malware scanner, but it's free and can help find malware in other hidden folders/files: https://www.rfxn.com/projects/linux-malware-detect/
-
What affordable anti-malware suites are available for Zorin Lite?
there is also linux-malware-detect - maldet -- https://www.rfxn.com/projects/linux-malware-detect/ [github repo] -- which can work in tangent with what you mentioned, ClamAV, but is not a requirement for operation..
-
Good way to backup systemctl services?
when the package being installed is intended to be ran as a systemd service, the PKGBUILD file, which we'll reference maldet's as an example, contains a line with a command, see line 107, that places the service file, in our case this file into the location specified, /usr/lib/systemd/system/maldet.service.
What are some alternatives?
Loki - Loki - Simple IOC and YARA Scanner
clamav - ClamAV - Documentation is here: https://docs.clamav.net
malware-ioc - Indicators of Compromises (IOC) of our various investigations
Suricata - Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
awesome-yara - A curated list of awesome YARA rules, tools, and people.
svntogit-packages - Automatic import of svn 'packages' repo (read-only mirror)
yarGen - yarGen is a generator for YARA rules
flare-floss - FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.
DIE-engine - DIE engine
yara-python - The Python interface for YARA
device-flasher