We’re thrilled to announce the release of YARA-X 1.0.0, marking the end of the beta phase and the beginning of a new era for YARA users.| YARA-X
Introduction Detecting things in Mach-O binaries used to be quite an effort in the original YARA; it would involve magic byte validation, guessing offsets, counting occurrences, and a lot more.| Blog on YARA-X
When I began developing YARA-X, my primary goal was to create a tool capable of eventually replacing YARA for serious, professional use.| Blog on YARA-X
Not all YARA rules perform equally; some can significantly slow down scanning throughput. When working with a large set of rules, identifying which ones are causing performance bottlenecks can be challenging, especially without the right tools.| Blog on YARA-X
Consistent code formatting isn’t just about aesthetics; it makes code easier to read, understand, and maintain. For many programming languages, there are tools that help you enforce a consistent coding style across your codebase.| Blog on YARA-X
Starting with version 0.6.0, YARA-X’s command-line interface (CLI) now supports NDJSON output —a feature contributed by Wesley Shields, a seasoned contributor to YARA who’s also been making strides in YARA-X.| Blog on YARA-X
One of the design goals for YARA-X was to create a parser that could be reused in various tools like code formatters, linters, automatic rule generators.| Blog on YARA-X
How YARA-X can be used for extracting information from multiple file formats| YARA-X
For over 15 years, YARA has been growing and evolving until it became an indispensable tool in every malware researcher’s toolbox.| YARA-X