applications/forensics tools

yara - Pattern matching Swiss knife for malware researchers

License: ASL 2.0
YARA is a tool aimed at (but not limited to) helping malware researchers to
identify and classify malware samples. With YARA you can create descriptions
of malware families (or whatever you want to describe) based on textual or
binary patterns. Each description, a.k.a rule, consists of a set of strings
and a Boolean expression which determine its logic.


yara-3.5.0-7.1.fc20.i686 [235 KiB] Changelog by Michal Ambroz (2017-04-13):
- Adding patch from pull request 627 until 3.5.1 is released
- Fixes CVE-2016-10210 CVE-2016-10211 CVE-2017-5923 CVE-2017-5924
yara-3.5.0-5.1.fc20.i686 [234 KiB] Changelog by Lawrence R. Rogers (2016-09-09):
- Repackaged for CERT LFTR to work with yara-python.
yara-3.5.0-1.fc20.i686 [485 KiB] Changelog by Lawrence R. Rogers (2016-08-02):
* Release 3.5.0-1
	Version 3.5.0
		Match length operator (
		Performance improvements
		Less memory consumption while scanning processes
		Exception handling when scanning memory blocks
		Negative integers in meta fields
		Added the --stack-size command-argument
		Functions import_ordinal, is_dll, is_32bit and is_64bit added to PE module
		Functions rich_signature.toolid and rich_signature.version added to PE module
		Lots of bug fixes
yara-3.4.0-2.fc20.i686 [461 KiB] Changelog by Lawrence R. Rogers (2015-09-24):
* Release 3.4.0-2
	Added a build requires of openssl-devel

Listing created by Repoview-0.6.6-4.el7