yara 2.0.0-1 source package in Ubuntu
Changelog
yara (2.0.0-1) unstable; urgency=medium * New upstream release. * debian/changelog.upstream: added to provide a upstream changelog to libyara-dev, libyara0, python-yara, python3-yara and yara. * debian/control: - Added the X-Python-Version and X-Python3-Version fields. - Changed from "Python" to "Python 3" in short description of the python3-yara binary to avoid a lintian "duplicate-short-description" message. - Enabled the VCS fields. * debian/copyright: - Added Hilko Bengen as package maintainer. - Added references to windows/include/{pcre,pcreposix}.h and windows/yarac/getopt.c, all using BSD-3-Clause license. - Removed references to: - libyara/grammar.y and libyara/elf.h that were rewritten and relicensed as Apache-2.0. - libyara/lex.l that was removed from source code. - Updated the upstream e-mail address. - Updated the packaging years. * debian/libyara0.symbols: updated. * debian/man/: created to provide absent manpages. Currently, yarac.1. * debian/patches/: - Added a header to fix-python-build. - Updated the fix-python-build and manpage patches. * debian/{python,python3}-yara.lintian-overrides: added to explain a specific situation to lintian. * debian/README.Debian: updated. * debian/rules: - Added the override_dh_installchangelogs to install the changelog.upstream file. - Added a command to override_dh_auto_clean target to remove yara-python/build directory. * debian/watch: little adjustment. * debian/yara.manpages: created to install the yarac manpage. -- Joao Eriberto Mota Filho <email address hidden> Sun, 05 Jan 2014 15:47:56 +0000
Upload details
- Uploaded by:
- Debian Forensics
- Uploaded to:
- Sid
- Original maintainer:
- Debian Forensics
- Architectures:
- any
- Section:
- misc
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
yara_2.0.0-1.dsc | 1.8 KiB | b06cdd65f9780cfa3600c7d8f978673ca5153cb72a402cb70df5f2af54a0d640 |
yara_2.0.0.orig.tar.gz | 566.3 KiB | 66f3fb05593e88db325d9435e6e2e3f4a96c6e0f1be5b9dc037415d1f96d7399 |
yara_2.0.0-1.debian.tar.gz | 9.8 KiB | d482bf693aef84bba63cdf5dccdaa6a060a7333ec36eb58cd7eb75918cf7f039 |
Available diffs
- diff from 1.7.2-3 to 2.0.0-1 (331.5 KiB)
No changes file available.
Binary packages built by this source
- libyara-dev: help to identify and classify malwares (development files)
YARA is a tool aimed at helping malware researchers to identify
and classify malware samples. With YARA you can create descriptions
of malware families based on textual or binary patterns contained
on samples of those families. Each description consists of a set of
strings and a Boolean expression which determines its logic. This is
useful in forensics analysis.
.
Complex and powerful rules can be created by using binary strings with
wild-cards, case-insensitive text strings, special operators, regular
expressions and many other features.
.
Are examples of the organizations and services using YARA:
.
- VirusTotal Intelligence (https://www.virustotal .com/intelligen ce/)
- jsunpack-n (http://jsunpack. jeek.org/)
- We Watch Your Website (http://www.wewatchyour website. com/)
- FireEye, Inc. (http://www.fireeye. com)
- Fidelis XPS (http://www.fidelissecu rity.com/ network- security- appliance/ \
Fidelis-XPS)
.
The Volatility Framework is an example of the software that uses YARA.
.
This package provides development libraries and headers.
- libyara0: No summary available for libyara0 in ubuntu trusty.
No description available for libyara0 in ubuntu trusty.
- python-yara: help to identify and classify malwares (Python bindings)
YARA is a tool aimed at helping malware researchers to identify
and classify malware samples. With YARA you can create descriptions
of malware families based on textual or binary patterns contained
on samples of those families. Each description consists of a set of
strings and a Boolean expression which determines its logic. This is
useful in forensics analysis.
.
Complex and powerful rules can be created by using binary strings with
wild-cards, case-insensitive text strings, special operators, regular
expressions and many other features.
.
Are examples of the organizations and services using YARA:
.
- VirusTotal Intelligence (https://www.virustotal .com/intelligen ce/)
- jsunpack-n (http://jsunpack. jeek.org/)
- We Watch Your Website (http://www.wewatchyour website. com/)
- FireEye, Inc. (http://www.fireeye. com)
- Fidelis XPS (http://www.fidelissecu rity.com/ network- security- appliance/ \
Fidelis-XPS)
.
The Volatility Framework is an example of the software that uses YARA.
.
This package provides Python 2 bindings.
- python3-yara: help to identify and classify malwares (Python 3 bindings)
YARA is a tool aimed at helping malware researchers to identify
and classify malware samples. With YARA you can create descriptions
of malware families based on textual or binary patterns contained
on samples of those families. Each description consists of a set of
strings and a Boolean expression which determines its logic. This is
useful in forensics analysis.
.
Complex and powerful rules can be created by using binary strings with
wild-cards, case-insensitive text strings, special operators, regular
expressions and many other features.
.
Are examples of the organizations and services using YARA:
.
- VirusTotal Intelligence (https://www.virustotal .com/intelligen ce/)
- jsunpack-n (http://jsunpack. jeek.org/)
- We Watch Your Website (http://www.wewatchyour website. com/)
- FireEye, Inc. (http://www.fireeye. com)
- Fidelis XPS (http://www.fidelissecu rity.com/ network- security- appliance/ \
Fidelis-XPS)
.
The Volatility Framework is an example of the software that uses YARA.
.
This package provides Python 3 bindings.
- yara: help to identify and classify malwares
YARA is a tool aimed at helping malware researchers to identify
and classify malware samples. With YARA you can create descriptions
of malware families based on textual or binary patterns contained
on samples of those families. Each description consists of a set of
strings and a Boolean expression which determines its logic. This is
useful in forensics analysis.
.
Complex and powerful rules can be created by using binary strings with
wild-cards, case-insensitive text strings, special operators, regular
expressions and many other features.
.
Are examples of the organizations and services using YARA:
.
- VirusTotal Intelligence (https://www.virustotal .com/intelligen ce/)
- jsunpack-n (http://jsunpack. jeek.org/)
- We Watch Your Website (http://www.wewatchyour website. com/)
- FireEye, Inc. (http://www.fireeye. com)
- Fidelis XPS (http://www.fidelissecu rity.com/ network- security- appliance/ \
Fidelis-XPS)
.
The Volatility Framework is an example of the software that uses YARA.