yara 2.0.0-1 source package in Ubuntu

Changelog

yara (2.0.0-1) unstable; urgency=medium


  * New upstream release.
  * debian/changelog.upstream: added to provide a upstream changelog to
    libyara-dev, libyara0, python-yara, python3-yara and yara.
  * debian/control:
      - Added the X-Python-Version and X-Python3-Version fields.
      - Changed from "Python" to "Python 3" in short description of the
        python3-yara binary to avoid a lintian "duplicate-short-description"
        message.
      - Enabled the VCS fields.
  * debian/copyright:
      - Added Hilko Bengen as package maintainer.
      - Added references to windows/include/{pcre,pcreposix}.h and
        windows/yarac/getopt.c, all using BSD-3-Clause license.
      - Removed references to:
          - libyara/grammar.y and libyara/elf.h that were rewritten and
            relicensed as Apache-2.0.
          - libyara/lex.l that was removed from source code.
      - Updated the upstream e-mail address.
      - Updated the packaging years.
  * debian/libyara0.symbols: updated.
  * debian/man/: created to provide absent manpages. Currently, yarac.1.
  * debian/patches/:
      - Added a header to fix-python-build.
      - Updated the fix-python-build and manpage patches.
  * debian/{python,python3}-yara.lintian-overrides: added to explain a
    specific situation to lintian.
  * debian/README.Debian: updated.
  * debian/rules:
      - Added the override_dh_installchangelogs to install the
        changelog.upstream file.
      - Added a command to override_dh_auto_clean target to remove
        yara-python/build directory.
  * debian/watch: little adjustment.
  * debian/yara.manpages: created to install the yarac manpage.

 -- Joao Eriberto Mota Filho <email address hidden>  Sun, 05 Jan 2014 15:47:56 +0000

Upload details

Uploaded by:
Debian Forensics
Uploaded to:
Sid
Original maintainer:
Debian Forensics
Architectures:
any
Section:
misc
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
yara_2.0.0-1.dsc 1.8 KiB b06cdd65f9780cfa3600c7d8f978673ca5153cb72a402cb70df5f2af54a0d640
yara_2.0.0.orig.tar.gz 566.3 KiB 66f3fb05593e88db325d9435e6e2e3f4a96c6e0f1be5b9dc037415d1f96d7399
yara_2.0.0-1.debian.tar.gz 9.8 KiB d482bf693aef84bba63cdf5dccdaa6a060a7333ec36eb58cd7eb75918cf7f039

Available diffs

No changes file available.

Binary packages built by this source

libyara-dev: help to identify and classify malwares (development files)

 YARA is a tool aimed at helping malware researchers to identify
 and classify malware samples. With YARA you can create descriptions
 of malware families based on textual or binary patterns contained
 on samples of those families. Each description consists of a set of
 strings and a Boolean expression which determines its logic. This is
 useful in forensics analysis.
 .
 Complex and powerful rules can be created by using binary strings with
 wild-cards, case-insensitive text strings, special operators, regular
 expressions and many other features.
 .
 Are examples of the organizations and services using YARA:
 .
  - VirusTotal Intelligence (https://www.virustotal.com/intelligence/)
  - jsunpack-n (http://jsunpack.jeek.org/)
  - We Watch Your Website (http://www.wewatchyourwebsite.com/)
  - FireEye, Inc. (http://www.fireeye.com)
  - Fidelis XPS (http://www.fidelissecurity.com/network-security-appliance/ \
    Fidelis-XPS)
 .
 The Volatility Framework is an example of the software that uses YARA.
 .
 This package provides development libraries and headers.

libyara0: No summary available for libyara0 in ubuntu trusty.

No description available for libyara0 in ubuntu trusty.

python-yara: help to identify and classify malwares (Python bindings)

 YARA is a tool aimed at helping malware researchers to identify
 and classify malware samples. With YARA you can create descriptions
 of malware families based on textual or binary patterns contained
 on samples of those families. Each description consists of a set of
 strings and a Boolean expression which determines its logic. This is
 useful in forensics analysis.
 .
 Complex and powerful rules can be created by using binary strings with
 wild-cards, case-insensitive text strings, special operators, regular
 expressions and many other features.
 .
 Are examples of the organizations and services using YARA:
 .
  - VirusTotal Intelligence (https://www.virustotal.com/intelligence/)
  - jsunpack-n (http://jsunpack.jeek.org/)
  - We Watch Your Website (http://www.wewatchyourwebsite.com/)
  - FireEye, Inc. (http://www.fireeye.com)
  - Fidelis XPS (http://www.fidelissecurity.com/network-security-appliance/ \
    Fidelis-XPS)
 .
 The Volatility Framework is an example of the software that uses YARA.
 .
 This package provides Python 2 bindings.

python3-yara: help to identify and classify malwares (Python 3 bindings)

 YARA is a tool aimed at helping malware researchers to identify
 and classify malware samples. With YARA you can create descriptions
 of malware families based on textual or binary patterns contained
 on samples of those families. Each description consists of a set of
 strings and a Boolean expression which determines its logic. This is
 useful in forensics analysis.
 .
 Complex and powerful rules can be created by using binary strings with
 wild-cards, case-insensitive text strings, special operators, regular
 expressions and many other features.
 .
 Are examples of the organizations and services using YARA:
 .
  - VirusTotal Intelligence (https://www.virustotal.com/intelligence/)
  - jsunpack-n (http://jsunpack.jeek.org/)
  - We Watch Your Website (http://www.wewatchyourwebsite.com/)
  - FireEye, Inc. (http://www.fireeye.com)
  - Fidelis XPS (http://www.fidelissecurity.com/network-security-appliance/ \
    Fidelis-XPS)
 .
 The Volatility Framework is an example of the software that uses YARA.
 .
 This package provides Python 3 bindings.

yara: help to identify and classify malwares

 YARA is a tool aimed at helping malware researchers to identify
 and classify malware samples. With YARA you can create descriptions
 of malware families based on textual or binary patterns contained
 on samples of those families. Each description consists of a set of
 strings and a Boolean expression which determines its logic. This is
 useful in forensics analysis.
 .
 Complex and powerful rules can be created by using binary strings with
 wild-cards, case-insensitive text strings, special operators, regular
 expressions and many other features.
 .
 Are examples of the organizations and services using YARA:
 .
  - VirusTotal Intelligence (https://www.virustotal.com/intelligence/)
  - jsunpack-n (http://jsunpack.jeek.org/)
  - We Watch Your Website (http://www.wewatchyourwebsite.com/)
  - FireEye, Inc. (http://www.fireeye.com)
  - Fidelis XPS (http://www.fidelissecurity.com/network-security-appliance/ \
    Fidelis-XPS)
 .
 The Volatility Framework is an example of the software that uses YARA.