VirusTotal/yara

GitHub: VirusTotal/yara

YARA 是一款跨平台的模式匹配引擎,专为恶意软件识别与分类设计,通过灵活的规则语法实现对文本和二进制模式的精确匹配。

Stars: 9450 | Forks: 1554

[![Join the chat at https://gitter.im/VirusTotal/yara](https://badges.gitter.im/Join%20Chat.svg)](https://gitter.im/VirusTotal/yara?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge&utm_content=badge) [![AppVeyor build status](https://ci.appveyor.com/api/projects/status/7glqg19w4oolm7pr?svg=true)](https://ci.appveyor.com/project/plusvic/yara) [![Coverity status](https://scan.coverity.com/projects/9057/badge.svg?flat=1)](https://scan.coverity.com/projects/plusvic-yara) ## YARA 概览 YARA 是一款旨在(但不限于)帮助恶意软件研究人员识别和分类恶意软件样本的工具。使用 YARA,您可以基于文本或二进制模式创建恶意软件家族(或任何您想描述的内容)的描述。每个描述(即规则)由一组字符串和一个决定其逻辑的布尔表达式组成。让我们看一个例子: ``` rule silent_banker : banker { meta: description = "This is just an example" threat_level = 3 in_the_wild = true strings: $a = {6A 40 68 00 30 00 00 6A 14 8D 91} $b = {8D 4D B0 2B C1 83 C0 27 99 6A 4E 59 F7 F9} $c = "UVODFRYSIHLNWPEJXQZAKCBGMT" condition: $a or $b or $c } ``` 上面的规则告诉 YARA,任何包含这三个字符串之一的文件都必须被报告为 *silent_banker*。这只是一个简单的例子,利用通配符、不区分大小写的字符串、正则表达式、特殊运算符以及您将在 [YARA's documentation](https://yara.readthedocs.org/) 中发现的许多其他功能,可以创建更复杂、更强大的规则。 YARA 是跨平台的,可以在 Windows、Linux 和 Mac OS X 上运行,可以通过其命令行界面使用,也可以通过 yara-python 扩展从您自己的 Python 脚本中使用。 ## 其他资源 您使用 GitHub 存储 YARA 规则吗?[YARA-CI](https://yara-ci.cloud.virustotal.com) 可能是您工具箱中的一个有用补充。这是一个 GitHub 应用程序,可为您的规则提供持续测试,帮助您识别常见错误和误报。 如果您计划使用 YARA 扫描压缩文件(.zip、.tar 等),您应该看看 [yextend](https://github.com/BayshoreNetworks/yextend),这是由 Bayshore Networks 开发并开源的一个非常有用的 YARA 扩展。 此外,[InQuest](https://inquest.net/) 的伙伴们整理了一份很棒的 [YARA-related stuff](https://github.com/InQuest/awesome-yara) 列表。 ## 谁在使用 YARA * [0x101 Cyber Security](https://0x101-cyber-security.de) * [Adlice](https://www.adlice.com/) * [AlienVault](https://otx.alienvault.com/) * [Avast](https://www.avast.com/) * [BAE Systems](https://www.baesystems.com/home?r=ai) * [Bayshore Networks, Inc.](https://www.bayshorenetworks.com) * [Binalyze](https://www.binalyze.com/) * [BinaryAlert](https://github.com/airbnb/binaryalert) * [Blueliv](https://www.blueliv.com) * [Cado Security](https://docs.cadosecurity.com/cado-response/investigate/detections#setting-up-detections) * [Cisco Talos Intelligence Group](https://talosintelligence.com/) * [Cloudina Security](https://cloudina.co.uk) * [Cofense](https://cofense.com) * [Conix](https://www.conix.fr) * [Corelight](https://corelight.com/products/yara) * [CounterCraft](https://www.countercraft.eu) * [Cuckoo Sandbox](https://github.com/cuckoosandbox/cuckoo) * [Cyber Triage](https://www.cybertriage.com) * [Cybereason](https://www.cybereason.com) * [Digita Security](https://digitasecurity.com/product/uxprotect) * [Dragos Platform](https://dragos.com/platform/) * [Dtex Systems](https://dtexsystems.com) * [ESET](https://www.eset.com) * [ESTsecurity](https://www.estsecurity.com) * [Elastic Security](https://github.com/elastic/protections-artifacts) * [FactorX.ai](https://factorx.ai) * [Fidelis XPS](https://www.fidelissecurity.com/network-security-appliance/Fidelis-XPS) * [FireEye, Inc.](https://www.fireeye.com) * [Forcepoint](https://www.forcepoint.com) * [Fox-IT](https://www.fox-it.com) * [FSF](https://github.com/EmersonElectricCo/fsf) * [Guidance Software](https://www.guidancesoftware.com/endpointsecurity) * [Heroku](https://heroku.com) * [Hornetsecurity](https://www.hornetsecurity.com/en/) * [ICS Defense](https://icsdefense.net/) * [InQuest](https://www.inquest.net/) * [IntelOwl](https://github.com/intelowlproject/IntelOwl) * [Joe Security](https://www.joesecurity.org) * [Kaspersky Lab](https://www.kaspersky.com) * [KnowBe4](https://www.knowbe4.com) * [Koodous](https://koodous.com/) * [Laika BOSS](https://github.com/lmco/laikaboss) * [Lastline, Inc.](https://www.lastline.com) * [libguestfs](https://www.libguestfs.org/) * [LimaCharlie](https://limacharlie.io/) * [Malpedia](https://malpedia.caad.fkie.fraunhofer.de/) * [Malwation](https://malwation.com/) * [McAfee Advanced Threat Defense](https://mcafee.com/atd) * [Metaflows](https://www.metaflows.com) * [NBS System](https://www.nbs-system.com/) * [ndaal](https://ndaal.eu) * [NetLock](https://netlockendpoint.com) * [Nextron Systems](https://www.nextron-systems.com) * [Nozomi Networks](https://www.nozominetworks.com) * [osquery](https://www.osquery.io) * [Payload Security](https://www.payload-security.com) * [PhishMe](https://phishme.com/) * [Picus Security](https://www.picussecurity.com/) * [Radare2](https://rada.re) * [RedSocks Security](https://redsocks.eu/) * [ReversingLabs](https://reversinglabs.com) * [Scanii](https://scanii.com) * [SecondWrite](https://www.secondwrite.com) * [SonicWall](https://www.sonicwall.com/) * [SpamStopsHere](https://www.spamstopshere.com) * [Spyre](https://github.com/spyre-project/spyre) * [stoQ](https://stoq.punchcyber.com) * [Sublime Security](https://sublime.security) * [SumoLogic](https://sumologic.com) * [Tanium](https://www.tanium.com/) * [Tenable Network Security](https://www.tenable.com/) * [Tenzir](https://tenzir.com) * [The DigiTrust Group](https://www.digitrustgroup.com/) * [ThreatConnect](https://www.threatconnect.com/) * [ThreatStream, Inc.](https://www.threatstream.com) * [Thug](https://github.com/buffer/thug) * [Threat.Zone](https://threat.zone) * [TouchWeb](https://www.touchweb.fr) * [Trend Micro](https://www.trendmicro.com) * [UnpacMe](https://www.unpac.me) * [UpSight Security Inc.](https://upsight.ai/) * [Uptycs Inc](https://www.uptycs.com/) * [Veeam](https://www.veeam.com/) * [Verisys Antivirus API](https://www.ionxsolutions.com/products/verisys-virus-api) * [VirusTotal Intelligence](https://www.virustotal.com/intelligence/) * [VMRay](https://www.vmray.com/) * [Volexity](https://www.volexity.com/products-overview/volcano/) * [We Watch Your Website](https://www.wewatchyourwebsite.com/) * [x64dbg](https://x64dbg.com) * [YALIH](https://github.com/Masood-M/YALIH) 您在使用它吗?想在这里看到您的网站吗?
标签:C++, Docker‑Compose, Python, TCP/UDP协议, Web界面, YARA, 二进制分析, 二进制文件分析, 云安全监控, 云安全运维, 云提供商集成, 云计算, 云资产可视化, 云资产清单, 威胁情报, 字符串搜索, 安全工具, 安全测试集成, 客户端加密, 客户端加密, 客户端加密, 客户端加密, 带宽管理, 开发者工具, 开源安全, 恶意软件检测, 持续安全评估, 数据擦除, 无后门, 杀毒软件, 样本分类, 模式匹配, 正则表达式, 漏洞管理平台, 用户界面自定义, 系统运维工具, 网络安全, 自动化资产收集, 规则引擎, 跨平台, 逆向工具, 逆向工程, 速率限制, 隐私保护, 静态分析, 默认DNS解析器