applications/forensics tools

yara - Pattern matching Swiss knife for malware researchers

Website: http://VirusTotal.github.io/yara/
License: ASL 2.0
Description:
YARA is a tool aimed at (but not limited to) helping malware researchers to
identify and classify malware samples. With YARA you can create descriptions
of malware families (or whatever you want to describe) based on textual or
binary patterns. Each description, a.k.a rule, consists of a set of strings
and a Boolean expression which determine its logic.

Packages

yara-3.5.0-5.1.fc20.src [7.3 MiB] Changelog by Lawrence R. Rogers (2016-09-09):
- Repackaged for CERT LFTR to work with yara-python.
yara-3.5.0-1.fc20.src [7.3 MiB] Changelog by Lawrence R. Rogers (2016-08-02):
* Release 3.5.0-1
	Version 3.5.0
		Match length operator (http://yara.readthedocs.io/en/v3.5.0/writingrules.html#match-length)
		Performance improvements
		Less memory consumption while scanning processes
		Exception handling when scanning memory blocks
		Negative integers in meta fields
		Added the --stack-size command-argument
		Functions import_ordinal, is_dll, is_32bit and is_64bit added to PE module
		Functions rich_signature.toolid and rich_signature.version added to PE module
		Lots of bug fixes
yara-3.4.0-2.fc20.src [7.2 MiB] Changelog by Lawrence R. Rogers (2015-09-24):
* Release 3.4.0-2
	Added a build requires of openssl-devel

Listing created by Repoview-0.6.6-1.el6