red black purple gradient

Open-Source YARA Rules

ReversingLabs developed a set of Open-Source YARA rules which undergo rigorous quality assurance to ensure zero false positives, tested against a cloud repository of 40B+ binaries.

100’s of Open-Source YARA Rules Now Available

ReversingLabs has developed, tested and published over 100 Open-Source YARA rules on GitHub.

The rules cover a broad range of categories, detecting a multitude of malware downloaders, viruses, trojans, exploits and ransomware.

examples of yara rules

How to Use Open-Source YARA Rules Today

YARA detection rules are developed for threat hunters, threat researchers, incident responders and security analysts with the mission to reduce malware infection risk across the organization.

Each unique rule can inspect file content on endpoints, during transfer, execution or at rest. While there’s no limit to usage, the best results are seen with fully inspected multi-layered content.

Apply these YARA rules within static analysis solutions that perform decomposition, dynamic sandbox solutions that perform in memory YARA matching, network IPS controls or even SIEMs.

how to use yara

Access Quality Open-Source YARA Rules on GitHub

On June 30th 2020 ReversingLabs published over 100 open-source YARA rules within the ReversingLabs GitHub repository.

ReversingLabs plans to use the GitHub repository as the primary delivery method for threat defenders to access updated and quality open-source YARA rules that detect the latest threats.

github dashboard

Reduce Attack Surface Risk

Deep software and file analysis to speed release and response

Back to Top