{"id":13366650,"url":"https://github.com/VirusTotal/yara","last_synced_at":"2025-03-12T18:31:15.856Z","repository":{"id":5822635,"uuid":"7037996","full_name":"VirusTotal/yara","owner":"VirusTotal","description":"The pattern matching swiss knife","archived":false,"fork":false,"pushed_at":"2025-02-27T10:43:51.000Z","size":23920,"stargazers_count":8583,"open_issues_count":176,"forks_count":1478,"subscribers_count":318,"default_branch":"master","last_synced_at":"2025-03-08T10:52:31.809Z","etag":null,"topics":["yara"],"latest_commit_sha":null,"homepage":"https://virustotal.github.io/yara/","language":"C","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"bsd-3-clause","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/VirusTotal.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"COPYING","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":"SECURITY.md","support":null,"governance":null,"roadmap":null,"authors":"AUTHORS","dei":null,"publiccode":null,"codemeta":null}},"created_at":"2012-12-06T15:33:08.000Z","updated_at":"2025-03-08T02:35:35.000Z","dependencies_parsed_at":"2023-09-23T08:14:58.558Z","dependency_job_id":"7386ec60-1303-4a14-9038-b77d338d462c","html_url":"https://github.com/VirusTotal/yara","commit_stats":{"total_commits":2977,"total_committers":219,"mean_commits":"13.593607305936073","dds":"0.32112865300638227","last_synced_commit":"390b66bc93143c688611ba303c664bbfc84e7a0b"},"previous_names":[],"tags_count":50,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/VirusTotal%2Fyara","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/VirusTotal%2Fyara/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/VirusTotal%2Fyara/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/VirusTotal%2Fyara/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/VirusTotal","download_url":"https://codeload.github.com/VirusTotal/yara/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":242538983,"owners_count":20145882,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["yara"],"created_at":"2024-07-30T00:01:28.968Z","updated_at":"2025-03-12T18:31:15.848Z","avatar_url":"https://github.com/VirusTotal.png","language":"C","readme":"[![Join the chat at https://gitter.im/VirusTotal/yara](https://badges.gitter.im/Join%20Chat.svg)](https://gitter.im/VirusTotal/yara?utm_source=badge\u0026utm_medium=badge\u0026utm_campaign=pr-badge\u0026utm_content=badge)\n[![AppVeyor build status](https://ci.appveyor.com/api/projects/status/7glqg19w4oolm7pr?svg=true)](https://ci.appveyor.com/project/plusvic/yara)\n[![Coverity status](https://scan.coverity.com/projects/9057/badge.svg?flat=1)](https://scan.coverity.com/projects/plusvic-yara)\n\n\n\n## YARA in a nutshell\n\nYARA is a tool aimed at (but not limited to) helping malware researchers to\nidentify and classify malware samples. With YARA you can create descriptions of\nmalware families (or whatever you want to describe) based on textual or binary\npatterns. Each description, a.k.a. rule, consists of a set of strings and a\nboolean expression which determine its logic. Let's see an example:\n\n```yara\nrule silent_banker : banker\n{\n    meta:\n        description = \"This is just an example\"\n        threat_level = 3\n        in_the_wild = true\n\n    strings:\n        $a = {6A 40 68 00 30 00 00 6A 14 8D 91}\n        $b = {8D 4D B0 2B C1 83 C0 27 99 6A 4E 59 F7 F9}\n        $c = \"UVODFRYSIHLNWPEJXQZAKCBGMT\"\n\n    condition:\n        $a or $b or $c\n}\n```\n\nThe above rule is telling YARA that any file containing one of the three strings\nmust be reported as *silent_banker*. This is just a simple example, more\ncomplex and powerful rules can be created by using wild-cards, case-insensitive\nstrings, regular expressions, special operators and many other features that\nyou'll find explained in [YARA's documentation](https://yara.readthedocs.org/).\n\nYARA is multi-platform, running on Windows, Linux and Mac OS X, and can be used\nthrough its command-line interface or from your own Python scripts with the\nyara-python extension.\n\n## Additional resources\n\nDo you use GitHub for storing your YARA rules? [YARA-CI](https://yara-ci.cloud.virustotal.com)\nmay be a useful addition to your toolbelt. This is GitHub application that provides\ncontinuous testing for your rules, helping you to identify common mistakes and\nfalse positives.\n\nIf you plan to use YARA to scan compressed files (.zip, .tar, etc) you should\ntake a look at [yextend](https://github.com/BayshoreNetworks/yextend), a very\nhelpful extension to YARA developed and open-sourced by Bayshore Networks.\n\nAdditionally, the guys from [InQuest](https://inquest.net/) have curated an\nawesome list of [YARA-related stuff](https://github.com/InQuest/awesome-yara).\n\n## Who's using YARA\n\n* [0x101 Cyber Security](https://0x101-cyber-security.de)\n* [Adlice](https://www.adlice.com/)\n* [AlienVault](https://otx.alienvault.com/)\n* [Avast](https://www.avast.com/)\n* [BAE Systems](https://www.baesystems.com/home?r=ai)\n* [Bayshore Networks, Inc.](https://www.bayshorenetworks.com)\n* [Binalyze](https://www.binalyze.com/)\n* [BinaryAlert](https://github.com/airbnb/binaryalert)\n* [Blueliv](https://www.blueliv.com)\n* [Cado Security](https://docs.cadosecurity.com/cado-response/investigate/detections#setting-up-detections)\n* [Cisco Talos Intelligence Group](https://talosintelligence.com/)\n* [Cloudina Security](https://cloudina.co.uk)\n* [Cofense](https://cofense.com)\n* [Conix](https://www.conix.fr)\n* [Corelight](https://corelight.com/products/yara)\n* [CounterCraft](https://www.countercraft.eu)\n* [Cuckoo Sandbox](https://github.com/cuckoosandbox/cuckoo)\n* [Cyber Triage](https://www.cybertriage.com)\n* [Cybereason](https://www.cybereason.com)\n* [Digita Security](https://digitasecurity.com/product/uxprotect)\n* [Dragos Platform](https://dragos.com/platform/)\n* [Dtex Systems](https://dtexsystems.com)\n* [ESET](https://www.eset.com)\n* [ESTsecurity](https://www.estsecurity.com)\n* [Elastic Security](https://github.com/elastic/protections-artifacts)\n* [Fidelis XPS](https://www.fidelissecurity.com/network-security-appliance/Fidelis-XPS)\n* [FireEye, Inc.](https://www.fireeye.com)\n* [Forcepoint](https://www.forcepoint.com)\n* [Fox-IT](https://www.fox-it.com)\n* [FSF](https://github.com/EmersonElectricCo/fsf)\n* [Guidance Software](https://www.guidancesoftware.com/endpointsecurity)\n* [Heroku](https://heroku.com)\n* [Hornetsecurity](https://www.hornetsecurity.com/en/)\n* [ICS Defense](https://icsdefense.net/)\n* [InQuest](https://www.inquest.net/)\n* [IntelOwl](https://github.com/intelowlproject/IntelOwl)\n* [Joe Security](https://www.joesecurity.org)\n* [Kaspersky Lab](https://www.kaspersky.com)\n* [KnowBe4](https://www.knowbe4.com)\n* [Koodous](https://koodous.com/)\n* [Laika BOSS](https://github.com/lmco/laikaboss)\n* [Lastline, Inc.](https://www.lastline.com)\n* [libguestfs](https://www.libguestfs.org/)\n* [LimaCharlie](https://limacharlie.io/)\n* [Malpedia](https://malpedia.caad.fkie.fraunhofer.de/)\n* [Malwation](https://malwation.com/)\n* [McAfee Advanced Threat Defense](https://mcafee.com/atd)\n* [Metaflows](https://www.metaflows.com)\n* [NBS System](https://www.nbs-system.com/)\n* [ndaal](https://ndaal.eu)\n* [NetLock](https://netlockendpoint.com)\n* [Nextron Systems](https://www.nextron-systems.com)\n* [Nozomi Networks](https://www.nozominetworks.com)\n* [osquery](https://www.osquery.io)\n* [Payload Security](https://www.payload-security.com)\n* [PhishMe](https://phishme.com/)\n* [Picus Security](https://www.picussecurity.com/)\n* [Radare2](https://rada.re)\n* [RedSocks Security](https://redsocks.eu/)\n* [ReversingLabs](https://reversinglabs.com)\n* [Scanii](https://scanii.com)\n* [SecondWrite](https://www.secondwrite.com)\n* [SonicWall](https://www.sonicwall.com/)\n* [SpamStopsHere](https://www.spamstopshere.com)\n* [Spyre](https://github.com/spyre-project/spyre)\n* [stoQ](https://stoq.punchcyber.com)\n* [Sublime Security](https://sublime.security)\n* [SumoLogic](https://sumologic.com)\n* [Tanium](https://www.tanium.com/)\n* [Tenable Network Security](https://www.tenable.com/)\n* [Tenzir](https://tenzir.com)\n* [The DigiTrust Group](https://www.digitrustgroup.com/)\n* [ThreatConnect](https://www.threatconnect.com/)\n* [ThreatStream, Inc.](https://www.threatstream.com)\n* [Thug](https://github.com/buffer/thug)\n* [Threat.Zone](https://threat.zone)\n* [TouchWeb](https://www.touchweb.fr)\n* [Trend Micro](https://www.trendmicro.com)\n* [UnpacMe](https://www.unpac.me)\n* [UpSight Security Inc.](https://upsight.ai/)\n* [Uptycs Inc](https://www.uptycs.com/)\n* [Veeam](https://www.veeam.com/)\n* [Verisys Antivirus API](https://www.ionxsolutions.com/products/verisys-virus-api)\n* [VirusTotal Intelligence](https://www.virustotal.com/intelligence/)\n* [VMRay](https://www.vmray.com/)\n* [Volexity](https://www.volexity.com/products-overview/volcano/)\n* [We Watch Your Website](https://www.wewatchyourwebsite.com/)\n* [x64dbg](https://x64dbg.com)\n* [YALIH](https://github.com/Masood-M/YALIH)\n\nAre you using it? Want to see your site listed here?\n","funding_links":[],"categories":["C","Automated Malware Detection","others","Malware Detection","Threat intelligence","Malware Reversing","🔧 Packages","Tools"],"sub_categories":["Threat hunting","Static Analysis","⚡ Analyzing"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FVirusTotal%2Fyara","html_url":"https://awesome.ecosyste.ms/projects/github.com%2FVirusTotal%2Fyara","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FVirusTotal%2Fyara/lists"}