applications/forensics tools

yara - Pattern matching Swiss knife for malware researchers

Website: http://VirusTotal.github.io/yara/
License: ASL 2.0
Description:
YARA is a tool aimed at (but not limited to) helping malware researchers to
identify and classify malware samples. With YARA you can create descriptions
of malware families (or whatever you want to describe) based on textual or
binary patterns. Each description, a.k.a rule, consists of a set of strings
and a Boolean expression which determine its logic.

Packages

yara-3.5.0-7.1.fc21.x86_64 [211 KiB] Changelog by Michal Ambroz (2017-04-13):
- Adding patch from pull request 627 until 3.5.1 is released
- https://patch-diff.githubusercontent.com/raw/VirusTotal/yara/pull/627.patch
- Fixes CVE-2016-10210 CVE-2016-10211 CVE-2017-5923 CVE-2017-5924
yara-3.5.0-5.1.fc21.x86_64 [210 KiB] Changelog by Lawrence R. Rogers (2016-09-09):
- Repackaged for CERT LFTR to work with yara-python.
yara-3.5.0-1.fc21.x86_64 [477 KiB] Changelog by Lawrence R. Rogers (2016-08-02):
* Release 3.5.0-1
	Version 3.5.0
		Match length operator (http://yara.readthedocs.io/en/v3.5.0/writingrules.html#match-length)
		Performance improvements
		Less memory consumption while scanning processes
		Exception handling when scanning memory blocks
		Negative integers in meta fields
		Added the --stack-size command-argument
		Functions import_ordinal, is_dll, is_32bit and is_64bit added to PE module
		Functions rich_signature.toolid and rich_signature.version added to PE module
		Lots of bug fixes
yara-3.4.0-2.fc21.x86_64 [457 KiB] Changelog by Lawrence R. Rogers (2015-09-24):
* Release 3.4.0-2
	Added a build requires of openssl-devel

Listing created by Repoview-0.6.6-4.el7