Best YARA Alternatives in 2025
Find the top alternatives to YARA currently available. Compare ratings, reviews, pricing, and features of YARA alternatives in 2025. Slashdot lists the best YARA alternatives on the market that offer competing products that are similar to YARA. Sort through YARA alternatives below to make the best choice for your needs
-
1
Avira Cloud Sandbox
Avira
The Avira Cloud Sandbox, an automated, unlimited-scale malware analysis service, is an award-winning and highly regarded product. It combines multiple advanced analysis technologies to produce a complete threat intelligence report using an uploaded file. The Cloud Sandbox API provides a detailed, file-specific threat intelligence report. It provides valuable, actionable intelligence. The report includes a detailed classification of each file, information about the techniques, tactics, and procedures (IoCs), and a description of why and how the submitted file was deemed clean, malicious, or suspicious. Cloud Sandbox by Avira leverages technologies from the Avira Protection Cloud. This cloud security system underpins Avira's anti-malware, threat intelligence solutions. We protect nearly a billion people worldwide through OEM technology partnerships. -
2
Secure Malware Analytics (formerly Threat Grid), combines advanced threat intelligence with sandboxing to provide a single solution to protect organizations against malware. You will be able to understand what malware is doing or trying to do, how big a threat it poses and how you can defend yourself against it. Secure Malware Analytics quickly analyzes files and suspicious behavior in your environment. Your security teams receive context-rich malware analytics, threat intelligence, and a quick response to threats. Secure Malware Analytics analyzes a file's behavior against millions of samples and billions upon billions of malware artifacts. Secure Malware Analytics identifies the key behavioral indicators and associated campaigns of malware. Secure Malware Analytics offers robust search capabilities, correlations, detailed static and dynamic analysis.
-
3
odix
odix
odix's patent technology disarms malicious codes from files. Our concept is simple. Instead of trying to detect malware, odix creates a malware-free copy of the file for the user. Incoming files provide total protection against known and unknown threats to the corporate network. odix's malware prevention technology is based on its Deep File inspection and TrueCDR™, patented technology. These algorithms offer a new detection-less approach to File-Based attacks. Core CDR (Content Disarm and Reconstructions), focuses on verifying that the file structure is valid at the binary level and disarms known and unknown threats. This is quite different from anti-virus or sandbox methods which scan for threats, detect a small number of malware and block files. CDR prevents all malware, even zero-days. The user also gets a safe copy the original infected file. -
4
Hybrid Analysis
Hybrid Analysis
These are common 'how to' and 'troubleshooting guides for the Falcon Sandbox platform and community platform. You can navigate through the articles by using the menu on the left. Hybrid Analysis requires users to go through the Hybrid Analysis Vetting Process before they can obtain an API key or download malware samples. Please be aware that you must adhere to the Hybrid Analysis Terms & Conditions and only use these samples as research purposes. It is not allowed to share your API key or user credentials with anyone else. If you suspect that your API key, or user credentials, have been compromised, please notify Hybrid Analysis immediately. Sometimes, a vetting request may be rejected because of incomplete data, missing real name, real company name, or any other means of validating cybersecurity credentials. It is possible to submit a vetting request again in this instance. -
5
Binary Ninja
Binary Ninja
$299 one-time paymentBinary Ninja is an interactive disassembler and decompiler that can also be used as a binary analysis platform. It is available for Windows, macOS and Linux. You can disassemble executables and libraries in multiple formats, platforms, architectures. For any supported architecture, even your own, decompile code to C and BNIL. Automate analysis using C++, Python, or Rust APIs, from within or outside the UI. Interactively visualize control flow and navigate cross-references. Name variables and functions, apply types and create structures. Add comments. Our Enterprise product allows you to collaborate effortlessly by using synchronized commits. Our decompiler is available for all architectures that are officially supported. It works with all architectures at one cost and uses a powerful family IL called BNIL. Not only our architectures but also community architectures can provide amazing decompilation. -
6
QFlow
Quarkslab
Analyze the threats that may be posed by files. Before accessing unknown websites, make sure URLs are checked. To improve your detection, optimize your resources. Restore trust following a breach Increase malware detection, filter false positives, and improve breach prevention. To optimize and speed up analysis, increase the capabilities of security analysts. Reduce incident response times and concentrate on the most important threats. Establish a system of detection to prevent threats and raise cybersecurity awareness throughout your organization. All users, including those with no cybersecurity skills, should be empowered. Set up consistent detection in your IT infrastructure and reserve your security team's expertise for the most serious threats. QFlow detection capabilities can be used to complement your existing incident response efforts. You can easily scale up to speed up your cyber-attack response, restore trust after a breach, and meet your business continuity plan goals. -
7
FileScan.IO
FileScan GmbH
Today, a major problem in threat detection is that static analysis tools do not go deep enough. They often fail to extract relevant Indicator of Compromise ("IOCs") due to sophisticated obfuscation or encryption (often multi-layered). This leads to the requirement of a second stage sandbox, which in general does not scale well and is expensive. FileScan.IO solves this problem. It is a next-gen malware analysis platform with the following emphasis: - Providing rapid and in-depth threat analysis services capable of massive processing - Focus on Indicator-of-Compromise (IOC) extraction and actionable context Key Benefits - Perform detection and IOC extraction for all common files in a single platform - Rapidly identify threats, their capabilities and update your security systems - Search your corporate network for compromised endpoints - Analyze files at scale without actually executing them - Easy reporting for entry level analysts and executive summary - Easy deployment and maintenance -
8
Deep Discovery Inspector
Trend Micro
Deep Discovery Inspector can be used as a virtual or physical network appliance. It is designed to quickly detect advanced malware, which can bypass traditional security defenses and infiltrate sensitive data. It uses specialized detection engines and custom-designed sandbox analysis to detect and prevent breaches. Targeted ransomware is a form of advanced malware that encrypts and demands payment for data release. It bypasses traditional security measures and can be used to compromise organizations' systems. Deep Discovery Inspector uses reputation analysis and known patterns to detect the latest ransomware attacks including WannaCry. The customized sandbox detects file modifications, encryption behavior and modifications to backup/restore processes. Security professionals are constantly being bombarded with threat data from multiple sources. Trend Micro™; XDR for Networks helps to prioritize threats and provide visibility into an attacker's attack. -
9
Admin By Request
Admin By Request
Rapidly provisioning Just-In Time privilege elevation across your entire staff. Workstations and servers can be managed and onboarded via an easy-to-use portal. Through thread and behavioral analysis, identify and prevent malware attacks and data breaches by revealing risky users and assets. By elevating apps - not users. Save time and money by delegating privileges according to the user or group. There's an appropriate method of elevation for every user, whether it's a developer within the IT department, or a tech novice in HR, to service your endpoints. Admin By Request comes with all features and can be customized to meet the needs of users or groups. -
10
ReversingLabs Titanium Platform
ReversingLabs
Advanced malware analysis platform that detects malicious files faster through automated static analysis. It can be used in any cloud and any environment. More than 360 file formats were processed and 3600 file types were identified from various platforms, applications and malware families. Real-time, deep inspection and analysis of files. This can be scaled to 150 million files per hour without dynamic execution. Connectors that are tightly coupled integrate industry-leading email, SIEM and SOAR platforms, as well as EDR, SIEM and SIEM. Unique Automated Static Analysis completely dissects the internal contents of files in just 5 ms, without execution, which eliminates the need for dynamic analysis in most instances. -
11
VirusTotal
VirusTotal
VirusTotal inspects items using over 70 antivirus scanners, URL/domain blocking services, and a multitude of tools to extract signals. Any user can use their browser to select a file and send it directly to VirusTotal. VirusTotal offers a variety of file submission options, including the primary web interface, desktop uploaders and browser extensions, as well as a programmatic API. The web interface is the most popular submission method. Submissions can be scripted using any programming language that uses the HTTP-based public API. VirusTotal is useful for detecting malicious content, as well as identifying false positives and normal items that have been detected as malicious by one or several scanners. URLs can be submitted in the same way as files. You can submit URLs via the VirusTotal webpage or browser extensions. -
12
FileAlyzer
Spybot
FileAlyzer is the best tool to learn more about the inner workings of files. FileAlyzer provides basic file content, a standard viewer for hex, and a variety of custom displays to interpret complex file structures. This will help you understand the purpose behind a file. FileAlyzer also supports the generation of OpenSBI advanced parameters. With FileAlyzer, you can find the right attributes for your own malware file signatures. Files, as you see them, often contain more information than what is visible. This is called alternate data streams. FileAlyzer displays the additional information in these streams through a list associated with the current file and a basic viewer. Sometimes malware attaches itself to legitimate files as a custom stream. This can be identified here. Android apps are zip archives that contain the app code, many configuration files, and many resources. FileAlyzer will display some app properties. -
13
Threat.Zone
Malwation
$99 per month 1 RatingThreat.Zone is an interactive, hypervisor-based tool that analyzes malware and can be used to fight newer types. -
14
Healthy Package AI
DerScanner
FreeHealthy Package AI is a handy solution that ensures the health and security open-source packages. It protects your application from potential threats. DerScanner's power to analyze over 100 million packages allows developers to confidently evaluate open source dependencies before integrating into their projects. Healthy Package AI allows you to explore detailed insights with just a package name or GitHub URL, such as Facebook react. The platform analyzes a number of critical metrics to provide an overall security assessment. Search Popularity: Identifies libraries that are widely used and trusted, and can be relied upon for your projects. Author's Reliability : Assesses the authorship to ensure that contributors are experienced, trustworthy and able to mitigate risks from malicious developers. -
15
PT MultiScanner
Positive Technologies
PT MultiScanner offers multiple levels of anti-malware protection that can detect and block malware infections on corporate infrastructure, find hidden threats, and assist in investigating malware-related security incidents. Do you trust the same antivirus vendor every time? Instead, rely on the expertise of Positive Technologies and the top anti-malware vendors. PT MultiScanner is the best choice for both startups as well as large corporations due to its extensive integration support and scalability. Multiple anti-malware engines, static analyses, and Positive Technologies reputation list scanning are used to identify suspicious objects. The solution allows for scanning files and archives, even recursively compressed ones. PT MultiScanner is able to detect and block malware much more effectively than any single method. -
16
VMRay
VMRay
VMRay provides technology partners and enterprises worldwide with the best-in-class, scalable and automated malware analysis and detection systems that significantly reduce their vulnerability to malware-related threats and attacks. -
17
Falcon Sandbox
CrowdStrike
Falcon Sandbox provides deep analysis of unknown and evasive threats, enriches them with threat intelligence, and delivers actionable indicators for compromise (IOCs). This will enable your security team to better understand sophisticated malware attacks. It can also strengthen their defenses. Unique hybrid technology detects unknown exploits and defeats evasive malware. With in-depth analysis of all file, network and memory activity, you can uncover the entire attack lifecycle. With easy-to-understand reports and actionable IOCs, security teams can save time and increase their effectiveness. To uncover today's advanced and evasive malware, the most sophisticated analysis is required. Falcon Sandbox's Hybrid Analysis technology uncovers hidden behavior, defeats advanced malware, and delivers more IOCs to improve security infrastructure effectiveness. -
18
ANY.RUN
ANY.RUN
$109 per monthANY.RUN is a cloud malware sandbox that handles the heavy lifting of malware analysis for SOC and DFIR teams, as well as Threat Intelligence Feeds and Threat Intelligence Lookup. Every day, 400,000 professionals use our platform to investigate incidents and streamline threat analysis. - Real-time results: it takes about 40s from file upload to malware detection. - Interactivity: Unlike many automated turn-key solutions ANY.RUN is fully interactive (you can engage with the VM directly in the browser). This feature helps prevent zero-day exploits and sophisticated malware that evades signature-based detection. - Tailored for malware analysis: There’s built in network analysis tools, debugger, script tracer, and automatic config extraction from memory, among other useful tools. - Cost-savings: For businesses, ANY.RUN is more affordable to run than an on-premises solution because it doesn’t need any setup or maintenance time from your DevOps team. - Efficient onboarding of new hires: ANY.RUN’s intuitive interface means that even Junior SOC analysts can quickly learn to analyze malware and extract IOCs. Learn more at ANY.RUN's website. -
19
Cuckoo Sandbox
Cuckoo
Cuckoo can quickly provide detailed reports detailing the behavior of suspicious files when they are executed in a controlled environment. Malware is the Swiss-army knife of cybercriminals, and any other adversary to your company or organization. It's not enough to detect and remove malware artifacts in these changing times. It's also vital to understand how they work to understand the context, motivations and goals of a breach. Cuckoo Sandbox, a free software, automates the task of analysing any malicious file on Windows, macOS Linux, Linux, or Android. Cuckoo Sandbox, an open-source automated malware analysis system that is highly modular and flexible, has endless application possibilities. Analyze many malicious files (executables and office documents, emails, etc.) as well as malicious websites in virtualized Windows, Linux, macOS, Android environments. -
20
REVERSS
Anlyz
Today's threat actors are highly skilled and use disruptive technologies to penetrate security walls of companies in an unrelenting manner. Reverss offers automated dynamic malware analysis that enables Cyber Intelligence Response Teams to (CIRT), to reduce obfuscated malicious software faster and more effectively. A central detection engine powers rapid detection of malware to drive security operations towards correct threat response. With the support of robust security libraries that track and reverse past threats, you can get actionable insights about how to respond to and quickly eliminate attacks. To make security analysts more aware of the threat behavior and to provide context, enrich their tasks. To protect your business against future attacks, you can create thorough Malware Analysis Reports that detail every detail of how, why and when an evasion occurred. -
21
Zemana AntiMalware
Zemana
$24.95 per year 1 RatingScanning your computer for malware, spyware, viruses detection and removal is fast and easy. It detects and removes unwanted browser add-ons, adware and toolbars as well as any other malware. Based on your feedback, we are currently developing this product. Do not let malware steal your computer! Zemana is a cyber security company that protects you from identity theft, credit card fraud and other threats of the internet. This company is privately owned and was founded in 2007 by three college-educated graduates. Because there was no product that could stop the rapid increase in hacking variants, they wanted to offer more advanced security solutions. This is how Zemana AntiLogger, our pioneer product, was born. Zemana AntiLogger is not a virus database that only contains known variants. It was designed to block any suspicious or unexpected activity from a computer. -
22
Jotti
Jotti
Jotti's malware scanner is a free service that allows you to scan suspicious files using multiple anti-virus programs. You can submit up 5 files simultaneously. Each file can only be 250MB in size. No security solution can guarantee 100% protection, even if it uses multiple anti-virus engines. Anti-virus companies share all files so that they can improve the detection accuracy of their antivirus products. Although we don't want to know the names or addresses of our visitors, some data is logged and used by us. We understand privacy is important. We want you to fully understand what happens to the information you provide to us. We keep files that you send us for scanning and we share them with anti-malware organizations. This is done to improve detection accuracy for anti-malware products. We keep your files confidential. -
23
REMnux
REMnux
REMnux®, a Linux toolkit that allows you to reverse-engineer and analyze malicious software, is available. REMnux is a community-curated collection of tools that are free to use. Analysts can use it for malware analysis without the need to install or configure the tools. Downloading the REMnux virtual machines in OVA format is the easiest way to get them. Then import them into your hypervisor. You can also add the distro to an existing system that is running a compatible Ubuntu version or install it from scratch on a dedicated host. The REMnux toolkit provides Docker images of popular malware analysis software, so you can run them as containers. You can even run REMnux as a container. The REMnux documentation website provides information about how to install, use, and contribute to REMnux. -
24
AhnLab Xcanner
AhnLab
Due to their sensitive nature and outdated OS, it is difficult to apply the most recent security patch to fixed function systems such as Industrial Control Systems, Point of Sales (POS) Systems and KIOSKs. They are vulnerable to malware infection. These systems are often placed in low-bandwidth networks or air-gapped networks. Because these environments are limited to a set of processes that require minimal system requirements, it is often difficult to perform engine updates, real time detection and remediation using security programs designed for the PC environment. AhnLab Xcanner allows users to customize scan and repair options for each operating environment. There are no conflicts with pre-installed security software. It is easy to use and can be used by facility managers and workers on-site with no security knowledge. -
25
WildFire
Palo Alto Networks
WildFire®, which uses near-real-time analysis, detects targeted malware and advanced persistent threats that are previously unknown. This keeps your organization safe. Advanced file analysis capabilities are available to protect web portals and integrate with SOAR tools. WildFire's unique malware analysis capabilities that cover multiple threat vectors result in consistent security outcomes throughout your organization via an API. You can submit files and query volumes as you need them without the need for a next-generation firewall. Use industry-leading advanced analysis and prevent engine capabilities, regional cloud deployments, and a unique network effect. WildFire combines machine-learning, dynamic and static analysis with a custom-built environment to detect even the most complex threats across multiple stages. -
26
Joe Sandbox
Joe Security
Are you tired of performing high-level malware analysis? Do you feel tired of high-level malware analysis? Instead of focusing on one technology, try to use multiple technologies such as hybrid analysis, instrumentation and hooking, hardware virtualization, machine learning / artificial intelligence, and machine learning / emulation. You can see the difference in our reports. Deeply analyze URLs for phishing, drive-by downloads, scams and more. Joe Sandbox uses an advanced AI-based algorithm that includes template matching, perptual havehing, ORB feature detector, and more to detect malicious use of legit brands. To enhance the detection capabilities, you can add your logos and templates. Live Interaction allows you to interact with the sandbox directly from your browser. Click through complex malware installers or phishing campaigns. You can test your software against backdoors, information loss, and exploits (SAST or DAST). -
27
Comodo Antivirus
Comodo
$29.99 per yearFor $29.99 per device, you get complete protection for all your devices. This includes an award-winning firewall and host intrusion prevention, buffer overflow protection, and sandbox to untrusted software. Our antivirus program provides everything your family needs to surf the internet safely and use your device. The free download provides basic protection for your computer, but it may not be sufficient depending on your specific needs. Complete Antivirus protects your computer while you shop online and offers unlimited product support. We believe in creating a safe and secure environment for everyone. This is why we offer the best value on market. We are a company that creates the most advanced cyber security solutions for enterprise businesses. We also use that technology to protect homes around the world with Comodo Antivirus. -
28
VIPRE ThreatAnalyzer
VIPRE Security Group
$5400/year for 5q/ day VIPRE ThreatAnalyzer is a cutting-edge dynamic malware analysis sandbox designed to help you stay ahead of cyber threats. Safely uncover the potential impact of malware on your organization and respond faster and smarter to real threats. Today’s most dangerous attacks often hide in seemingly legitimate files—like executables, PDFs, or Microsoft Office documents—waiting for a single click to unleash chaos, disrupt operations, and cause massive financial damage. With ThreatAnalyzer, you can see exactly how these threats operate. It intercepts and reroutes suspicious files, including ransomware and zero-day threats, to a secure sandbox environment where they’re detonated and analyzed by a machine-learning engine. This gives you valuable insights into how an attack is constructed, what systems are at risk, and how to fortify your defenses. Gain the upper hand by understanding attackers’ strategies without jeopardizing your network. With VIPRE ThreatAnalyzer, you can outsmart cybercriminals before they strike. -
29
Symantec Content Analysis
Broadcom
1 RatingSymantec Content Analysis automatically escalates potential zero-day threats and brokers them for dynamic sandboxing before delivering content to users. Unknown content can be analyzed from one central location. This malware analyzer, which uses Symantec ProxySG to detect malicious behavior and expose zero day threats, uses a unique multilayer inspection and dual sandboxing approach. It can safely detonate suspicious URLs and files by using safe and secure encryption. Content Analysis provides multi-layer file inspection to help protect your organization from unknown and known threats. Content Analysis receives suspicious or unknown content from sources such as ProxySG, messaging gateway or other tools for deep inspection, interrogation and analysis. If deemed malicious, Content Analysis will block the file. This platform has been strengthened by recent enhancements. -
30
OPSWAT MetaDefender
OPSWAT
$0MetaDefender uses a variety of market-leading technologies that protect critical IT and OT systems. It also reduces the attack surface by detecting sophisticated file-borne threats such as advanced evasive malicious code, zero-day attacks and APTs (advanced persistant threats). MetaDefender integrates seamlessly with existing cybersecurity solutions on every layer of the infrastructure of your organization. MetaDefender's flexible deployment options, tailored to your specific use case and purpose-built, ensure that files entering, being saved on, or leaving your environment are secure--from your plant floor to your cloud. This solution uses a variety of technologies to assist your organization in developing a comprehensive strategy for threat prevention. MetaDefender protects your organization from advanced cybersecurity threats that are present in data originating from various sources, including the web, email, portable devices, and endpoints. -
31
Unkown Cyber
Unkown Cyber
Information is the key to a successful response to the next threat. Other solutions are unable to investigate alerts 24/ 7. Know instantly that an unknown suspect’s code is a malware variant quantifiably similar to other solutions by 70-100%. Know all the matched malware families and types, as well as IOCs, of the suspect. Act automatically and stop perfect malware matches. After obtaining a code of interest, escalate suspects. Automatically use newly extracted IOCs as well as all matched IOCs for hardening. YARA is a highly accurate bytecode based YARA that can be created automatically from the suspect who has just been convicted, from our collection of matched codes, or from selected malware samples. Customizable API allows you to automate actions to save expert time. This is done by automatically deobfuscating exploit code and reversing it to individual functions. -
32
Intezer Analyze
Intezer
Free 1 RatingIntezer’s Autonomous SOC platform triages alerts 24/7, investigates threats, and auto-remediates incidents for you. "Autonomously" investigate and triage every incident, with Intezer’s platform working like your Tier 1 SOC to escalate only the confirmed, serious threats. Easily integrate your security tools to get immediate value and streamline your existing workflows. Using intelligent automation built for incident responders, Intezer saves your team from time wasted on false positives, repetitive analysis tasks, and too many escalated alerts. What is Intezer? Intezer isn't really a SOAR, sandbox, or MDR platform, but it could replace any of those for your team. Intezer goes beyond automated SOAR playbooks, sandboxing, or manual alert triage to autonomously take action, make smart decisions, and give your team exactly what you need to respond quickly to serious threats. Over the years, we’ve fine-tuned and expanded the capabilities of Intezer’s proprietary code-analysis engine, AI, and algorithms to automate more and more of the time-consuming or repetitive tasks for security teams. Intezer is designed to analyze, reverse engineer, and investigate every alert while "thinking" like an experienced security analyst. -
33
BitNinja
BitNinja.com
$10 per serverBitNinja provides 3E Linux server protection for large hosting providers and small businesses equally. The three E stands for: effective, effortless, and enjoyable. Effective because of our unique Defense Network that uses the power of the Ninja Community. Every BitNinja-protected server worldwide shares attack information with each other, resulting in a more intelligent and stronger protection shield by every single assault. Effortless because it is fast and easy to install, so your server protection is up and running in no time. Enjoyable because you can take joy in the benefits of BitNinja, like the increased server capacity caused by the significant drop in the server load. Join our Defense Network for free today! -
34
Siterack
Siterack
$19 per monthEvery 60 seconds, your websites are pinged to ensure they are working properly. Siterack will notify you if an error is reported. Siterack automatically creates a daily backup of all sites and securely stores them in the cloud. Siterack displays all backups in the Control Center, so you can quickly search for the one that you need. Siterack automatically creates a backup before every update. Siterack then updates each package incrementally and scans the site using our AI to detect any problems or failures. Error Detection system. Siterack will notify you if anything goes wrong and automatically restores the most recent backup. Siterack Malware Engine uses dual-method malware detection technology to run daily scans for malicious packages and remove them. The system detects malware using a combination Yara rule violations and signature violations and automatically removes it when it is discovered. -
35
IObit Cloud
IObit Cloud
Founded in 2004, IObit offers innovative system utilities and security programs to enhance PC performance and security. IObit is a leader in PC optimization software and security software, having won more than 100 awards and received over 500 million downloads globally. IObit Cloud is an automated threat analysis system. We use the most recent Cloud Computing technology and Heuristic Analyzing to analyze the behavior spyware, keyloggers and bots. -
36
FileWall
Odix
$1 per user, per month 17 Ratingsodix, a market leader for Enterprise CDR (Content Disarm and Reconstruction), now offers FileWall, a native cybersecurity app for Microsoft Office 365 mailboxes. FileWall™, which is compatible with Microsoft security solutions like EOP and ATP, ensures complete protection against unknown attacks via email attachments. FileWall™, unlike other Microsoft security solutions, doesn't alter or harm any sender-related security capabilities. -
37
Immunity Debugger
Immunity Debugger
The interfaces of Immunity Debugger include a GUI and a command-line. The command line is always accessible at the bottom of the GUI. It allows users to use shortcuts just like they would in a text-based debugger such as WinDBG and GDB. To ensure that your WinDBG users don't have to be retrained, Immunity has created aliases. This will allow them to get the productivity boost that comes with the best debugger interface available. Our command bar allows you to run Python commands directly. You can either go back to previous commands or click in the dropdown menu to see all of the most recent commands. The interfaces of Immunity Debugger include a GUI and a command-line. The command line is always accessible at the bottom of the GUI. It allows users to use shortcuts just like they would in a text-based debugger such as WinDBG and GDB. -
38
Comodo Valkyrie
Comodo
Valkyrie analyses the entire file's run-time behavior and is therefore more effective in detecting zero-day threats than the signature-based detection systems used by traditional antivirus products. Users can upload files to be scanned and view scan results in a variety of dashboards and reports from the Valkyrie console. Comodo Labs can be contacted to perform in-depth human expert checks. The Comodo Unknown File Hunter tool lets users scan entire networks looking for unknown files and then upload them to Valkyrie to be analysed. Valkyrie analysis systems use multiple techniques to ensure that every file submitted is thoroughly analyzed before presenting the verdict. Valkyrie employs two types technologies to accomplish this: Automatic analysis and Human Expert analysis. -
39
NoDistribute
NoDistribute
Select your file to scan it with more than 35 anti-viruses. The scan results are never shared. You are free to create temporary mail addresses and use them for free. You may not want to share your files with antivirus companies for your own privacy. An API provided by VirusCheckMate, a reliable provider, is used. This API has been in use since 2014. You can learn more about their services at VirusCheckMate.net. Since 2013, we have not released the results of any scans. To verify that the results have not been distributed, you can run your own tests using our service. We receive thousands of views every day on file scans and previous scan results. You get 3 scans per day, which is part of the service that is free. However, we would appreciate it if you could help us by purchasing a scanner key. -
40
PolySwarm
PolySwarm
$299 per monthPolySwarm is unlike any other multiscanner: there is money at stake. Threat detection engines back their opinions at the artifact level (file URL, etc.). Based on their accuracy, they are economically rewarded or penalized. The following process is automated, and executed in near real-time by software engines. PolySwarm's network can be accessed via API or web interface. Crowdsourced intelligence (engine determinations), and a final score are sent back to the user. The reward is the money earned from the bounty and assertions. It is securely escrowed in an Ethereum smart-contract. Engines that make the correct assertion are awarded the initial bounty from an enterprise and the money included by the losing engines with their assertions. -
41
Trojan Killer
Gridinsoft
$35.95 per yearGridinSoft Trojan Killer will clean your system completely from viruses. We will also help you restore your computer's optimal performance. It is a virus removal tool that is fast, efficient, and reliable. It is now portable for easy use on any computer. Even when the internet is blocked This antimalware solution is effective against all cyber threats. We offer an all-in-one solution that can help you remove annoying advertisements, spyware, and other malicious tools created by hackers. -
42
NoVirusThanks
NoVirusThanks
We are an IT company located in Italy that focuses solely on the development and maintenance of web security tools and security software. Our applications are digitally signed (dual signings) and support both SHA1 & SHA2 certificates. They are completely virus-free and can be used in offices as well as business environments. Since the beginning of the decade, we have been serving the security community with selfless service. We look forward to the next ten years of happy end-users as our software is developed and maintained! NoVirusThanks™, a project that focuses on computer and Internet security, was launched in June 2008. One year later, we established NoVirusThanks™, Company Srl in Italy. Since our inception, we have created and maintained many security software programs, web-services, and highly customized software for Microsoft Windows NT-based operating system. -
43
Cofense Triage
Cofense
Cofense Triage™ speeds up phishing email identification. Integration and automation can improve your response time. To automatically detect and analyze threats, we use Cofense Intelligence™, rules and an industry-leading email engine. Our robust API allows you to integrate intelligent phishing defense in your workflow so that your team can concentrate their efforts and protect your company. We understand that stopping phishing isn't always easy. CofenseTriage™, makes it easy to access expert help on-demand. They are just a click away, available at any time. Our Threat Intelligence and Research Teams constantly update our YARA rules library, making it easier to identify new campaigns and improve response times. The Cofense Triage Community Exchange makes it possible to crowd-source threat intelligence and phishing email analysis, so you are never alone. -
44
THOR
Nextron Systems
THOR is the most flexible and sophisticated compromise assessment tool available. Incident response engagements typically begin with a set of compromised systems and a larger group of systems that could be affected. Manual analysis of many forensic images can prove difficult. THOR accelerates your forensic analysis by providing more than 12,000 handcrafted YARA Signatures, 400 Sigma rules and many anomaly detection rules. There are also thousands of IOCs. THOR is the ideal tool to highlight suspicious elements and reduce the workload. It also speeds up forensic analysis in critical moments when quick results are crucial. THOR is a comprehensive tool that covers all the Antivirus's weaknesses. THOR has a huge signature set that includes thousands of YARA, Sigma rules, IOCs and rootkit and anomaly check. It covers all types of threats. THOR not only detects backdoors and tools used by attackers but also outputs, temporary file changes, and other traces that indicate malicious activity. -
45
ESET Threat Intelligence
ESET
$132Expand your security intelligence beyond your local network and into global cyberspace. Access global, in-depth and up-to-date information about specific threats or attack sources. This can be difficult if you only have access within your network. ESET Threat Intelligence data streams use widely supported STIX/TAXII formats which makes it easy for SIEM tools to integrate with them. Integration allows you to get the most current information about the threat landscape in order to prevent and predict future attacks. ESET Threat Intelligence offers a full API for automating reports, YARA rules, and other functionalities that allow integration with other systems within an organization. These rules allow organizations to create custom rules to access company-specific information that security professionals are interested in. These details include the number of instances that specific threats have been detected worldwide. -
46
Chronicle SIEM
Chronicle
Google researchers continuously update the advanced detection engine with new rules and threat indicators to help you correlate petabytes worth of your telemetry. The detection engine of Chronicle includes predefined rules that are mapped to specific threats, suspicious activities, and security frameworks such as MITRE ATT&CK. Chronicle's alerting and detection only escalates the most serious threats. Risk scoring is based on context vulnerability and business risk. YARA-L makes it easy to create custom content and simplifies detection authoring. Automate detections and instantly correlate indicators of compromise (IoC), against one year security telemetry. Contextualize with third-party intelligence subscriptions and out-of-the box intelligence feeds -
47
Cyberstanc Swatbox
Cyberstanc
Traditional malware simulation and sandboxing solutions may not be able to detect emerging threats, as they rely on static analyses and pre-defined rules. SWATBOX, an advanced malware simulation platform and sandboxing tool, uses simulated intelligence to detect and respond in real-time to emerging threats. It is designed to simulate a variety of realistic attack scenarios. This allows organizations to assess their existing security solutions, and identify any potential weaknesses. SWATBOX uses a combination dynamic analysis, behavior analysis, and machine-learning to detect and analyse malware samples in a simulated environment. It uses real-life malware, which is created in a sandboxed simulation of a real-world environment and seeded with decoy data to lure attackers into an environment controlled where they can be observed and their behavior studied. -
48
Avira Protection Cloud
Avira
Avira detects cyber threats in real-time using its global sensor network. The Avira Protection Cloud creates intelligence related to the threats we identify and makes that intelligence immediately available for our technology partners. Dynamic File Analysis uses multiple sandbox approaches to behavioral profiling to identify advanced threats and cluster similar behavior. These powerful rules enable the identification of behavior patterns specific to malware strains and families, or reveal the malicious intent of the malware. The extended scanning engine of Avira is a highly efficient tool for identifying known malware families. It uses proprietary definitions, heuristic algorithms, powerful content extraction and de-obfuscation methods to identify malware. -
49
Cerber Security
Cerber Tech
Cerber Security vigorously defends WordPress from hacker attacks, spam, malware, and other threats. Blazingly fast and reliable in design A set of specialized request inspection algorithms screens incoming requests for malicious codes patterns and traffic anomalies. Bot detection engine detects and mitigates automated attacks. Reduces code injection and brute force attacks. GEO country rules restrict access. Both REST API and ordinary user numbers are blocked. Restricted access to REST API, XML-RPC. It uses a global list IP addresses that are known to be involved in malicious activity. Detects bots using heuristics and content-based algorithms. Compares IP address against a real-time list of IP addresses that are known to be disseminating spam, attacks on phishing and other malicious activity. Every file and folder on your website is thoroughly scanned for trojans, malware, and viruses. Automatically removes viruses and malware. Monitors suspicious, new, or changed files. -
50
WizWhy
WizSoft
WizWhy identifies the relationship between the values in one field and the values in other fields. The system analyzes a field that is selected by the user. It uses the other fields as independent variables. The dependent variable may be analyzed in a Boolean, or continuous manner. The user can fine tune the analysis by setting parameters such as the minimum probabilities of the rules, minimum numbers of cases for each rule, and the cost difference between a false alarm and a missed event. WizWhy reveals the rules between the dependent variable (condition) and other fields. The rules are expressed as if/then statements and if/only if statements. WizWhy identifies the main patterns in the data, the unexpected rules and the unexpected cases based on the rules discovered. WizWhy can predict new cases based on the rules discovered.