FileSize | 12686 |
MD5 | EA8C59C780BB43DAE3F9FF241A5B027F |
PackageDescription | help to identify and classify malwares (Python bindings)
YARA is a tool aimed at helping malware researchers to identify
and classify malware samples. With YARA you can create descriptions
of malware families based on textual or binary patterns contained
on samples of those families. Each description consists of a set of
strings and a Boolean expression which determines its logic. This is
useful in forensics analysis.
.
Complex and powerful rules can be created by using binary strings with
wild-cards, case-insensitive text strings, special operators, regular
expressions and many other features.
.
Are examples of the organizations and services using YARA:
.
- VirusTotal Intelligence (https://www.virustotal.com/intelligence/)
- jsunpack-n (http://jsunpack.jeek.org/)
- We Watch Your Website (http://www.wewatchyourwebsite.com/)
- FireEye, Inc. (http://www.fireeye.com)
- Fidelis XPS (http://www.fidelissecurity.com/network-security-appliance/ \
Fidelis-XPS)
.
The Volatility Framework is an example of the software that uses YARA.
.
This package provides Python 2 bindings. |
PackageMaintainer | Debian Forensics <forensics-devel@lists.alioth.debian.org> |
PackageName | python-yara |
PackageSection | python |
PackageVersion | 3.1.0-2+deb8u1 |
SHA-1 | 0166A8313D510F438F285547C7883C321FD3184E |
SHA-256 | F54D7543D50155E21114066AF937E9C2215FB59457DD746285506C36C6F0584B |