Key | Value |
---|---|
FileName | ./usr/share/lintian/overrides/python3-yara |
FileSize | 117 |
MD5 | 1C1623800BBA6E331DDB550278914632 |
SHA-1 | 9DFF92771C161C1C3F42E6874D621AA9FC09DDA1 |
SHA-256 | A57CC1985E86E2E3304967D886A6A700A87948BC3BC842E8DB3A25601ACA7FD4 |
SSDEEP | 3:Sqi8vl8/BGCFvms3JzvddLIK8qcVNWC:Sqi89ivmshvdJIRkC |
TLSH | T16EB0928B0D55B2B6556A1C792B2A6554B312C2EB8762D00C99EE6611499C0A9472BA03 |
hashlookup:parent-total | 8 |
hashlookup:trust | 90 |
The searched file hash is included in 8 parent files which include package known and seen by metalookup. A sample is included below:
Key | Value |
---|---|
FileSize | 14214 |
MD5 | C9DEB0FCC8DA610178D08075D7F04C19 |
PackageDescription | help to identify and classify malwares (Python 3 bindings) YARA is a tool aimed at helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families based on textual or binary patterns contained on samples of those families. Each description consists of a set of strings and a Boolean expression which determines its logic. This is useful in forensics analysis. . Complex and powerful rules can be created by using binary strings with wild-cards, case-insensitive text strings, special operators, regular expressions and many other features. . Are examples of the organizations and services using YARA: . - VirusTotal Intelligence (https://www.virustotal.com/intelligence/) - jsunpack-n (http://jsunpack.jeek.org/) - We Watch Your Website (http://www.wewatchyourwebsite.com/) - FireEye, Inc. (http://www.fireeye.com) - Fidelis XPS (http://www.fidelissecurity.com/network-security-appliance/ \ Fidelis-XPS) . The Volatility Framework is an example of the software that uses YARA. . This package provides Python 3 bindings. |
PackageMaintainer | Debian Forensics <forensics-devel@lists.alioth.debian.org> |
PackageName | python3-yara |
PackageSection | python |
PackageVersion | 3.1.0-2+deb8u1 |
SHA-1 | B8B39A55164A34FAB72E00C3387EEBE3815330AE |
SHA-256 | B56D94B2A6AD30857843E363D7FF98A653D916755F36362421476454F8623B79 |
Key | Value |
---|---|
FileSize | 14032 |
MD5 | 6EA15976B3D2D92566F2DC4D1456E80A |
PackageDescription | help to identify and classify malwares (Python 3 bindings) YARA is a tool aimed at helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families based on textual or binary patterns contained on samples of those families. Each description consists of a set of strings and a Boolean expression which determines its logic. This is useful in forensics analysis. . Complex and powerful rules can be created by using binary strings with wild-cards, case-insensitive text strings, special operators, regular expressions and many other features. . Are examples of the organizations and services using YARA: . - VirusTotal Intelligence (https://www.virustotal.com/intelligence/) - jsunpack-n (http://jsunpack.jeek.org/) - We Watch Your Website (http://www.wewatchyourwebsite.com/) - FireEye, Inc. (http://www.fireeye.com) - Fidelis XPS (http://www.fidelissecurity.com/network-security-appliance/ \ Fidelis-XPS) . The Volatility Framework is an example of the software that uses YARA. . This package provides Python 3 bindings. |
PackageMaintainer | Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com> |
PackageName | python3-yara |
PackageSection | python |
PackageVersion | 2.0.0-2 |
SHA-1 | B46C4E2FA4A7E5AC6B3DEEBEE443E5E7CAF7A858 |
SHA-256 | 7ECEBA94EDCBBB8156BCBF2EFC9BE6B6D4CCA566B763ACE230641194B65F83BF |
Key | Value |
---|---|
FileSize | 12812 |
MD5 | AFFA0DA51718A67E8A45C658571BC4A6 |
PackageDescription | help to identify and classify malwares (Python 3 bindings) YARA is a tool aimed at helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families based on textual or binary patterns contained on samples of those families. Each description consists of a set of strings and a Boolean expression which determines its logic. This is useful in forensics analysis. . Complex and powerful rules can be created by using binary strings with wild-cards, case-insensitive text strings, special operators, regular expressions and many other features. . Are examples of the organizations and services using YARA: . - VirusTotal Intelligence (https://www.virustotal.com/intelligence/) - jsunpack-n (http://jsunpack.jeek.org/) - We Watch Your Website (http://www.wewatchyourwebsite.com/) - FireEye, Inc. (http://www.fireeye.com) - Fidelis XPS (http://www.fidelissecurity.com/network-security-appliance/ \ Fidelis-XPS) . The Volatility Framework is an example of the software that uses YARA. . This package provides Python 3 bindings. |
PackageMaintainer | Debian Forensics <forensics-devel@lists.alioth.debian.org> |
PackageName | python3-yara |
PackageSection | python |
PackageVersion | 3.1.0-2+deb8u1 |
SHA-1 | 5460B63186B7D19D6EB2637690818AD1FCFF2A61 |
SHA-256 | C69C95361CD36800174C60C258EC50FED237A72A28A604CC59D8E9170A77ADF4 |
Key | Value |
---|---|
FileSize | 12416 |
MD5 | 4D385AFFD727196FB2AB464F150A15E1 |
PackageDescription | help to identify and classify malwares (Python 3 bindings) YARA is a tool aimed at helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families based on textual or binary patterns contained on samples of those families. Each description consists of a set of strings and a Boolean expression which determines its logic. This is useful in forensics analysis. . Complex and powerful rules can be created by using binary strings with wild-cards, case-insensitive text strings, special operators, regular expressions and many other features. . Are examples of the organizations and services using YARA: . - VirusTotal Intelligence (https://www.virustotal.com/intelligence/) - jsunpack-n (http://jsunpack.jeek.org/) - We Watch Your Website (http://www.wewatchyourwebsite.com/) - FireEye, Inc. (http://www.fireeye.com) - Fidelis XPS (http://www.fidelissecurity.com/network-security-appliance/ \ Fidelis-XPS) . The Volatility Framework is an example of the software that uses YARA. . This package provides Python 3 bindings. |
PackageMaintainer | Debian Forensics <forensics-devel@lists.alioth.debian.org> |
PackageName | python3-yara |
PackageSection | python |
PackageVersion | 3.1.0-2+deb8u1 |
SHA-1 | 05549A3997D803634C4C26A26FBA421EE22D3438 |
SHA-256 | 7DCFB436F1DEE3750C750DFF8C169B9768B7C633D889C56C6FE60515DC203F42 |
Key | Value |
---|---|
FileSize | 13616 |
MD5 | E3F75FCCC53197CC7AF1CD4E8C03402E |
PackageDescription | help to identify and classify malwares (Python 3 bindings) YARA is a tool aimed at helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families based on textual or binary patterns contained on samples of those families. Each description consists of a set of strings and a Boolean expression which determines its logic. This is useful in forensics analysis. . Complex and powerful rules can be created by using binary strings with wild-cards, case-insensitive text strings, special operators, regular expressions and many other features. . Are examples of the organizations and services using YARA: . - VirusTotal Intelligence (https://www.virustotal.com/intelligence/) - jsunpack-n (http://jsunpack.jeek.org/) - We Watch Your Website (http://www.wewatchyourwebsite.com/) - FireEye, Inc. (http://www.fireeye.com) - Fidelis XPS (http://www.fidelissecurity.com/network-security-appliance/ \ Fidelis-XPS) . The Volatility Framework is an example of the software that uses YARA. . This package provides Python 3 bindings. |
PackageMaintainer | Debian Forensics <forensics-devel@lists.alioth.debian.org> |
PackageName | python3-yara |
PackageSection | python |
PackageVersion | 3.1.0-2+deb8u1 |
SHA-1 | AF3BE2FF7F322C473AAA5C2714E9590680DFB7C6 |
SHA-256 | A17B083E9AEEFF2B4EE19BB05463979DA9BF5ECFF2AD6F8C0570A40E8A6DFFB7 |
Key | Value |
---|---|
FileSize | 13688 |
MD5 | 8BFD333662935A999D1E79C5C72B79E3 |
PackageDescription | help to identify and classify malwares (Python 3 bindings) YARA is a tool aimed at helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families based on textual or binary patterns contained on samples of those families. Each description consists of a set of strings and a Boolean expression which determines its logic. This is useful in forensics analysis. . Complex and powerful rules can be created by using binary strings with wild-cards, case-insensitive text strings, special operators, regular expressions and many other features. . Are examples of the organizations and services using YARA: . - VirusTotal Intelligence (https://www.virustotal.com/intelligence/) - jsunpack-n (http://jsunpack.jeek.org/) - We Watch Your Website (http://www.wewatchyourwebsite.com/) - FireEye, Inc. (http://www.fireeye.com) - Fidelis XPS (http://www.fidelissecurity.com/network-security-appliance/ \ Fidelis-XPS) . The Volatility Framework is an example of the software that uses YARA. . This package provides Python 3 bindings. |
PackageMaintainer | Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com> |
PackageName | python3-yara |
PackageSection | python |
PackageVersion | 2.0.0-2 |
SHA-1 | FAF2AEBC0094DE2926F4E299FC80A7410187C96F |
SHA-256 | BD279BE7319FC45B86E574A684ED4E3542B965C43D345EB3CEAA525BBF67F508 |
Key | Value |
---|---|
FileSize | 13242 |
MD5 | 21DE54B84D10C34A9C64ECC04F185E0C |
PackageDescription | Python3 bindings for YARA YARA is a tool aimed at helping malware researchers to identify and classify malware samples. With YARA, it is possible to create descriptions of malware families based on textual or binary patterns contained in samples of those families. Each description consists of a set of strings and a Boolean expression which determines its logic. . Complex and powerful rules can be created by using binary strings with wild-cards, case-insensitive text strings, special operators, regular expressions and many other features. . This package provides Python 3 bindings. |
PackageMaintainer | Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com> |
PackageName | python3-yara |
PackageSection | python |
PackageVersion | 3.4.0+dfsg-2build1 |
SHA-1 | 2045B7AC6C60359B61AFCE7585B38B1CA090F001 |
SHA-256 | 461BAF520EB9CE6A0BEAB7E137D4F92596C7A555D5810993F3FFD3AE91F5C89E |
Key | Value |
---|---|
CRC32 | 83796E76 |
FileName | 60975 |
FileSize | 12466 |
MD5 | 9C920FB06AE0409CD51EDE91DDB93F25 |
OpSystemCode | 362 |
PackageDescription | Python3 bindings for YARA YARA is a tool aimed at helping malware researchers to identify and classify malware samples. With YARA, it is possible to create descriptions of malware families based on textual or binary patterns contained in samples of those families. Each description consists of a set of strings and a Boolean expression which determines its logic. . Complex and powerful rules can be created by using binary strings with wild-cards, case-insensitive text strings, special operators, regular expressions and many other features. . This package provides Python 3 bindings. |
PackageMaintainer | Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com> |
PackageName | python3-yara |
PackageSection | python |
PackageVersion | 3.4.0+dfsg-2build1 |
ProductCode | 184821 |
RDS:package_id | 184821 |
SHA-1 | C25B8AC7E0A0293597B100AD5F3591B791653334 |
SHA-256 | 9AD08913FA76ADAFFD7B2A3EC275B77AF7C7C4F650550DB10537A6528C7364F9 |
SpecialCode | |
db | nsrl_legacy |
insert-timestamp | 1648755897.8532374 |
source | RDS_2022.03.1_legacy.db |