Skip to main content

A Python library for parsing and manipulating YARA rules using Abstract Syntax Trees

Project description

yaraast

A Python library for parsing and manipulating YARA rules using Abstract Syntax Trees.

Features

  • 100% YARA Parsing Success: Parses all production YARA files (273,683+ rules tested)
  • YARA-L 2.0 Support: Full support for Google Chronicle detection rules (891/891 files)
  • YARA-X Support: Compatible with YARA-X syntax and features
  • Advanced Features:
    • Hex nibble wildcards (4?, ?5, ??)
    • Regex modifiers (/i, /m, /s, /g)
    • VirusTotal LiveHunt module support
    • Wildcard string sets ($a*, any of ($prefix*))
    • Negative integers in metadata
    • Extended IN operator with ranges
    • Comment-aware hex string parsing
    • ClamAV syntax detection

Installation

pip install yaraast

Quick Start

from yaraast import Parser

# Parse YARA rules
yara_code = """
rule example {
    meta:
        author = "Security Team"
        version = 1
    strings:
        $hex = { 4D 5A 90 00 }
        $str = "malware" wide
    condition:
        $hex at 0 and $str
}
"""

parser = Parser(yara_code)
ast = parser.parse()

# Access rule components
rule = ast.rules[0]
print(f"Rule: {rule.name}")
print(f"Strings: {len(rule.strings)}")
print(f"Condition: {rule.condition}")

Advanced Usage

Lenient Parsing Mode

For files with mixed YARA/ClamAV syntax:

from yaraast import Parser

# Enable lenient mode to skip invalid patterns
parser = Parser(yara_code, lenient=True)
ast = parser.parse()

# Check for skipped patterns
if parser.errors:
    print(f"Skipped {len(parser.errors)} invalid patterns")

Working with YARA-L

from yaraast.yaral import YaraLParser

yaral_code = """
rule detect_suspicious_activity {
    meta:
        author = "Threat Intel"
    events:
        $e.metadata.event_type = "NETWORK_CONNECTION"
        $e.target.port = 443
    condition:
        $e
}
"""

parser = YaraLParser(yaral_code)
ast = parser.parse()

VirusTotal Module Support

Full support for VirusTotal LiveHunt and Retrohunt rules:

from yaraast import Parser

# Parse rules using VirusTotal module
vt_rule = """
import "vt"

rule vt_livehunt_example {
    meta:
        description = "Detect files based on VT intelligence"
    condition:
        vt.metadata.new_file and
        vt.metadata.analysis_stats.malicious > 5 and
        vt.metadata.file_type == vt.FileType.PE_EXE
}
"""

parser = Parser(vt_rule)
ast = parser.parse()

# Access VT module usage
print(f"Uses VT module: {'vt' in [imp.module for imp in ast.imports]}")

Supported VT module features:

  • vt.metadata.* - File metadata and analysis statistics
  • vt.behaviour.* - Behavioral analysis data
  • vt.net.* - Network activity indicators
  • All VirusTotal Intelligence operators and functions

Visitor Pattern

from yaraast import Parser
from yaraast.visitor import BaseVisitor

class RuleCollector(BaseVisitor):
    def __init__(self):
        self.rule_names = []

    def visit_rule(self, node):
        self.rule_names.append(node.name)
        super().visit_rule(node)

ast = Parser(yara_code).parse()
collector = RuleCollector()
collector.visit(ast)
print(f"Found rules: {collector.rule_names}")

Language Support

YARA Features

  • ✅ All YARA syntax and operators
  • ✅ Hex strings with wildcards and jumps
  • ✅ Regular expressions with modifiers
  • ✅ String modifiers (ascii, wide, nocase, fullword, xor, base64)
  • ✅ All condition operators and expressions
  • ✅ Module imports (pe, elf, math, hash, vt, etc.)
  • ✅ Private and global rules
  • ✅ Include directives

YARA-L 2.0 Features

  • ✅ Event matching and correlation
  • ✅ Outcome sections
  • ✅ Time windows and aggregations
  • ✅ Match sections
  • ✅ Complex boolean expressions
  • ✅ Chronicle-specific functions

YARA-X Features

  • ✅ New syntax elements
  • ✅ Enhanced type system
  • ✅ Compatibility mode

Testing

Verified with production rulesets:

  • ClamAV: 223,261 rules
  • YARA Master Collection: 31,442 rules
  • Community Rules: 11,331 rules
  • Google Chronicle: 891 YARA-L rules

Performance

  • Parses 273,683 rules across 14 files
  • 293 comprehensive tests
  • 47% code coverage
  • Handles files up to 91MB

Requirements

  • Python >= 3.13
  • click >= 8.1.0
  • rich >= 13.0.0
  • attrs >= 23.0.0
  • PyYAML >= 6.0.0

Optional Dependencies

# LSP support
pip install yaraast[lsp]

# libyara integration
pip install yaraast[libyara]

# Performance optimization
pip install yaraast[performance]

# Visualization
pip install yaraast[visualization]

# All features
pip install yaraast[all]

CLI Usage

# Parse YARA file
yaraast parse rules.yar

# Validate syntax
yaraast validate rules.yar

# Pretty-print with formatting
yaraast format rules.yar

# Start LSP server
yaraast lsp

License

MIT License - see LICENSE file for details

Author

Marc Rivero (mriverolopez@gmail.com)

Links

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

yaraast-0.6.1.tar.gz (364.8 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

yaraast-0.6.1-py3-none-any.whl (386.6 kB view details)

Uploaded Python 3

File details

Details for the file yaraast-0.6.1.tar.gz.

File metadata

  • Download URL: yaraast-0.6.1.tar.gz
  • Upload date:
  • Size: 364.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.9

File hashes

Hashes for yaraast-0.6.1.tar.gz
Algorithm Hash digest
SHA256 681f9ca1d5f71bd17887467c35ded10b24099cc95f85dcb33620d37295deaa59
MD5 6d399eb8bd0bcd4697bb97837f446979
BLAKE2b-256 a7c55adc15372cd21698c2c3721292a501060c4efb5811da1bdd0d1f1322f8ad

See more details on using hashes here.

File details

Details for the file yaraast-0.6.1-py3-none-any.whl.

File metadata

  • Download URL: yaraast-0.6.1-py3-none-any.whl
  • Upload date:
  • Size: 386.6 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.9

File hashes

Hashes for yaraast-0.6.1-py3-none-any.whl
Algorithm Hash digest
SHA256 1de3a0709099c48660b2516d0b5dfee047a9feb33f59c6a7868d9886992e50fd
MD5 2933464fe562947f2d7e8156f2d6b56b
BLAKE2b-256 a64dc7ba0c83e9b89bf16e6e64668108a7c56feb88b86e74a46fa9afd4c838e8

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page