Loading...
Loading...
Run YARA rules for pattern-based malware identification. Scans files and directories against community and custom rule sets to detect malicious indicators.
npx skill4agent add vchirrav/owasp-secure-coding-md malware-scan-yaraapt install yarabrew install yarayara --versionyara -r <rules-file-or-dir> <target-path>yara -r rules/ /path/to/scan/yara -r rule1.yar -r rule2.yar <target>yara -r -m rules/ <target>yara -r -s rules/ <target>yara -r -m -s rules/ <target> 2>&1 | tee yara-results.txtyara -r -t 60 rules/ <target>| # | Rule Name | File Matched | Tags | Description | Strings Matched |
|---|-----------|-------------|------|-------------|----------------|| Category | Description |
|---|---|
| Malware families | Known malware signatures |
| Packers | UPX, Themida, custom packers |
| Exploits | Shellcode, ROP chains |
| Webshells | PHP/ASP/JSP webshells |
| Crypto miners | Mining software indicators |
| Ransomware | Encryption/ransom indicators |
| RATs | Remote access trojans |