yara 2.0.0-2 source package in Ubuntu
Changelog
yara (2.0.0-2) unstable; urgency=medium * Removed PCRE build-dependency as Yara now uses its own RE engine * Added our fixes to build scripts that were accepted upstream (Closes: #734777) * Fixed symbols file, corrected SONAME and name of library package -- Hilko Bengen <email address hidden> Sun, 12 Jan 2014 23:37:07 +0100
Upload details
- Uploaded by:
- Debian Forensics
- Uploaded to:
- Sid
- Original maintainer:
- Debian Forensics
- Architectures:
- any
- Section:
- misc
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section | |
---|---|---|---|---|
Trusty | release | universe | misc |
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
yara_2.0.0-2.dsc | 1.5 KiB | 9a6168091ad561d59a5a31658805290667f00a4b458218629f2d2b61fdd85482 |
yara_2.0.0.orig.tar.gz | 566.3 KiB | 66f3fb05593e88db325d9435e6e2e3f4a96c6e0f1be5b9dc037415d1f96d7399 |
yara_2.0.0-2.debian.tar.gz | 8.9 KiB | 57d0073b3bdad36a6c96f30f9ef84db5bffac909b149a4d283bc65c0a3ca828b |
Available diffs
- diff from 2.0.0-1 to 2.0.0-2 (3.7 KiB)
No changes file available.
Binary packages built by this source
- libyara-dev: help to identify and classify malwares (development files)
YARA is a tool aimed at helping malware researchers to identify
and classify malware samples. With YARA you can create descriptions
of malware families based on textual or binary patterns contained
on samples of those families. Each description consists of a set of
strings and a Boolean expression which determines its logic. This is
useful in forensics analysis.
.
Complex and powerful rules can be created by using binary strings with
wild-cards, case-insensitive text strings, special operators, regular
expressions and many other features.
.
Are examples of the organizations and services using YARA:
.
- VirusTotal Intelligence (https://www.virustotal .com/intelligen ce/)
- jsunpack-n (http://jsunpack. jeek.org/)
- We Watch Your Website (http://www.wewatchyour website. com/)
- FireEye, Inc. (http://www.fireeye. com)
- Fidelis XPS (http://www.fidelissecu rity.com/ network- security- appliance/ \
Fidelis-XPS)
.
The Volatility Framework is an example of the software that uses YARA.
.
This package provides development libraries and headers.
- libyara2: help to identify and classify malwares (shared library)
YARA is a tool aimed at helping malware researchers to identify
and classify malware samples. With YARA you can create descriptions
of malware families based on textual or binary patterns contained
on samples of those families. Each description consists of a set of
strings and a Boolean expression which determines its logic. This is
useful in forensics analysis.
.
Complex and powerful rules can be created by using binary strings with
wild-cards, case-insensitive text strings, special operators, regular
expressions and many other features.
.
Are examples of the organizations and services using YARA:
.
- VirusTotal Intelligence (https://www.virustotal .com/intelligen ce/)
- jsunpack-n (http://jsunpack. jeek.org/)
- We Watch Your Website (http://www.wewatchyour website. com/)
- FireEye, Inc. (http://www.fireeye. com)
- Fidelis XPS (http://www.fidelissecu rity.com/ network- security- appliance/ \
Fidelis-XPS)
.
The Volatility Framework is an example of the software that uses YARA.
.
This package provides a shared library.
- python-yara: help to identify and classify malwares (Python bindings)
YARA is a tool aimed at helping malware researchers to identify
and classify malware samples. With YARA you can create descriptions
of malware families based on textual or binary patterns contained
on samples of those families. Each description consists of a set of
strings and a Boolean expression which determines its logic. This is
useful in forensics analysis.
.
Complex and powerful rules can be created by using binary strings with
wild-cards, case-insensitive text strings, special operators, regular
expressions and many other features.
.
Are examples of the organizations and services using YARA:
.
- VirusTotal Intelligence (https://www.virustotal .com/intelligen ce/)
- jsunpack-n (http://jsunpack. jeek.org/)
- We Watch Your Website (http://www.wewatchyour website. com/)
- FireEye, Inc. (http://www.fireeye. com)
- Fidelis XPS (http://www.fidelissecu rity.com/ network- security- appliance/ \
Fidelis-XPS)
.
The Volatility Framework is an example of the software that uses YARA.
.
This package provides Python 2 bindings.
- python3-yara: help to identify and classify malwares (Python 3 bindings)
YARA is a tool aimed at helping malware researchers to identify
and classify malware samples. With YARA you can create descriptions
of malware families based on textual or binary patterns contained
on samples of those families. Each description consists of a set of
strings and a Boolean expression which determines its logic. This is
useful in forensics analysis.
.
Complex and powerful rules can be created by using binary strings with
wild-cards, case-insensitive text strings, special operators, regular
expressions and many other features.
.
Are examples of the organizations and services using YARA:
.
- VirusTotal Intelligence (https://www.virustotal .com/intelligen ce/)
- jsunpack-n (http://jsunpack. jeek.org/)
- We Watch Your Website (http://www.wewatchyour website. com/)
- FireEye, Inc. (http://www.fireeye. com)
- Fidelis XPS (http://www.fidelissecu rity.com/ network- security- appliance/ \
Fidelis-XPS)
.
The Volatility Framework is an example of the software that uses YARA.
.
This package provides Python 3 bindings.
- yara: help to identify and classify malwares
YARA is a tool aimed at helping malware researchers to identify
and classify malware samples. With YARA you can create descriptions
of malware families based on textual or binary patterns contained
on samples of those families. Each description consists of a set of
strings and a Boolean expression which determines its logic. This is
useful in forensics analysis.
.
Complex and powerful rules can be created by using binary strings with
wild-cards, case-insensitive text strings, special operators, regular
expressions and many other features.
.
Are examples of the organizations and services using YARA:
.
- VirusTotal Intelligence (https://www.virustotal .com/intelligen ce/)
- jsunpack-n (http://jsunpack. jeek.org/)
- We Watch Your Website (http://www.wewatchyour website. com/)
- FireEye, Inc. (http://www.fireeye. com)
- Fidelis XPS (http://www.fidelissecu rity.com/ network- security- appliance/ \
Fidelis-XPS)
.
The Volatility Framework is an example of the software that uses YARA.