yara 1.7.2-3 source package in Ubuntu

Changelog

yara (1.7.2-3) unstable; urgency=low


  * Added files that are only used in Windows builds to debian/copyright
    (Closes: #733522)

 -- Hilko Bengen <email address hidden>  Sun, 29 Dec 2013 20:58:10 +0100

Upload details

Uploaded by:
Debian Forensics
Uploaded to:
Sid
Original maintainer:
Debian Forensics
Architectures:
any
Section:
misc
Urgency:
Low Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
yara_1.7.2-3.dsc 1.4 KiB afa2ba80bd3a9b90db9f53451649135bf40f4f3746b495b4fed2e4c106cd1da5
yara_1.7.2.orig.tar.gz 755.7 KiB 9246b4fb6efba1edd5d5eb75391de0d531d98bbcc95620e68ccb3e7628df9f5a
yara_1.7.2-3.debian.tar.gz 6.1 KiB 72e9b35123555847cbaf09f2f9c9ea39a9488a73b4172510a68578221d1f4326

Available diffs

No changes file available.

Binary packages built by this source

libyara-dev: help to identify and classify malwares (development files)

 YARA is a tool aimed at helping malware researchers to identify
 and classify malware samples. With YARA you can create descriptions
 of malware families based on textual or binary patterns contained
 on samples of those families. Each description consists of a set of
 strings and a Boolean expression which determines its logic. This is
 useful in forensics analysis.
 .
 Complex and powerful rules can be created by using binary strings with
 wild-cards, case-insensitive text strings, special operators, regular
 expressions and many other features.
 .
 Are examples of the organizations and services using YARA:
 .
  - VirusTotal Intelligence (https://www.virustotal.com/intelligence/)
  - jsunpack-n (http://jsunpack.jeek.org/)
  - We Watch Your Website (http://www.wewatchyourwebsite.com/)
  - FireEye, Inc. (http://www.fireeye.com)
  - Fidelis XPS (http://www.fidelissecurity.com/network-security-appliance/ \
    Fidelis-XPS)
 .
 The Volatility Framework is an example of the software that uses YARA.
 .
 This package provides development libraries and headers.

libyara0: No summary available for libyara0 in ubuntu trusty.

No description available for libyara0 in ubuntu trusty.

python-yara: help to identify and classify malwares (Python bindings)

 YARA is a tool aimed at helping malware researchers to identify
 and classify malware samples. With YARA you can create descriptions
 of malware families based on textual or binary patterns contained
 on samples of those families. Each description consists of a set of
 strings and a Boolean expression which determines its logic. This is
 useful in forensics analysis.
 .
 Complex and powerful rules can be created by using binary strings with
 wild-cards, case-insensitive text strings, special operators, regular
 expressions and many other features.
 .
 Are examples of the organizations and services using YARA:
 .
  - VirusTotal Intelligence (https://www.virustotal.com/intelligence/)
  - jsunpack-n (http://jsunpack.jeek.org/)
  - We Watch Your Website (http://www.wewatchyourwebsite.com/)
  - FireEye, Inc. (http://www.fireeye.com)
  - Fidelis XPS (http://www.fidelissecurity.com/network-security-appliance/ \
    Fidelis-XPS)
 .
 The Volatility Framework is an example of the software that uses YARA.
 .
 This package provides Python 2 bindings.

python3-yara: help to identify and classify malwares (Python 3 bindings)

 YARA is a tool aimed at helping malware researchers to identify
 and classify malware samples. With YARA you can create descriptions
 of malware families based on textual or binary patterns contained
 on samples of those families. Each description consists of a set of
 strings and a Boolean expression which determines its logic. This is
 useful in forensics analysis.
 .
 Complex and powerful rules can be created by using binary strings with
 wild-cards, case-insensitive text strings, special operators, regular
 expressions and many other features.
 .
 Are examples of the organizations and services using YARA:
 .
  - VirusTotal Intelligence (https://www.virustotal.com/intelligence/)
  - jsunpack-n (http://jsunpack.jeek.org/)
  - We Watch Your Website (http://www.wewatchyourwebsite.com/)
  - FireEye, Inc. (http://www.fireeye.com)
  - Fidelis XPS (http://www.fidelissecurity.com/network-security-appliance/ \
    Fidelis-XPS)
 .
 The Volatility Framework is an example of the software that uses YARA.
 .
 This package provides Python 3 bindings.

yara: help to identify and classify malwares

 YARA is a tool aimed at helping malware researchers to identify
 and classify malware samples. With YARA you can create descriptions
 of malware families based on textual or binary patterns contained
 on samples of those families. Each description consists of a set of
 strings and a Boolean expression which determines its logic. This is
 useful in forensics analysis.
 .
 Complex and powerful rules can be created by using binary strings with
 wild-cards, case-insensitive text strings, special operators, regular
 expressions and many other features.
 .
 Are examples of the organizations and services using YARA:
 .
  - VirusTotal Intelligence (https://www.virustotal.com/intelligence/)
  - jsunpack-n (http://jsunpack.jeek.org/)
  - We Watch Your Website (http://www.wewatchyourwebsite.com/)
  - FireEye, Inc. (http://www.fireeye.com)
  - Fidelis XPS (http://www.fidelissecurity.com/network-security-appliance/ \
    Fidelis-XPS)
 .
 The Volatility Framework is an example of the software that uses YARA.