Open pyllyukko opened 10 months ago
jq '.[] | select(.issue=="The regex string has a measurable performance impact")' yaraQA-issues.json
jq '.[] | select(.level>=2)'
/usr
It would be nice to have some YARA rule to detect malware like this:
gen_webshells.yar (from Arnims YARA rules) has a detection (WEBSHELL_ASP_Generic), but that file can't be used with ClamAV :(
WEBSHELL_ASP_Generic
jq '.[] | select(.issue=="The regex string has a measurable performance impact")' yaraQA-issues.json
jq '.[] | select(.level>=2)'
/usr