Install this package:
emerge -a app-forensics/yara-x
If the package is masked, you can unmask it using the autounmask tool or standard emerge options:
autounmask app-forensics/yara-x
Or alternatively:
emerge --autounmask-write -a app-forensics/yara-x
| Version | EAPI | Keywords | Slot |
|---|---|---|---|
| 1.8.1 | 8 | amd64 | 0 |
| 1.14.0 | 8 | ~amd64 | 0 |
| 1.11.0 | 8 | ~amd64 | 0 |
| 1.10.0-r1 | 8 | amd64 | 0 |
<pkgmetadata> <maintainer type="person" proxied="yes"> <email>mario.haustein@hrz.tu-chemnitz.de</email> <name>Mario Haustein</name> </maintainer> <maintainer type="project" proxied="proxy"> <email>proxy-maint@gentoo.org</email> <name>Proxy Maintainers</name> </maintainer> <longdescription> YARA is a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families (or whatever you want to describe) based on textual or binary patterns. YARA-X is a re-incarnation of YARA rewritten in Rust, eventually replacing YARA. </longdescription> <upstream> <remote-id type="github">VirusTotal/yara-x</remote-id> </upstream> </pkgmetadata>
Manage flags for this package:
euse -i <flag> -p app-forensics/yara-x |
euse -E <flag> -p app-forensics/yara-x |
euse -D <flag> -p app-forensics/yara-x
| Flag | Description | 1.8.1 | 1.14.0 | 1.11.0 | 1.10.0-r1 |
|---|---|---|---|---|---|
| python | Add optional support/bindings for the Python language | ✓ | ✓ | ✓ | ✓ |
| Type | File | Size | Versions |
|---|---|---|---|
| DIST | yara-x-1.11.0.tar.gz | 46624874 bytes | 1.11.0 |
| DIST | yara-x-1.14.0.tar.gz | 53590528 bytes | 1.14.0 |
| DIST | yara-x-1.8.1.tar.gz | 45705548 bytes | 1.8.1 |
| Type | File | Size |
|---|---|---|
| DIST | yara-x-1.10.0-crates.tar.xz | 43548196 bytes |
| DIST | yara-x-1.10.0.tar.gz | 45731985 bytes |
| DIST | yara-x-1.11.0-crates.tar.xz | 45870116 bytes |
| DIST | yara-x-1.14.0-crates.tar.xz | 37085572 bytes |
| DIST | yara-x-1.8.1-crates.tar.xz | 43611272 bytes |