# Watch: https://github.com/VirusTotal/yara/tags
           SPELL=yara
         VERSION=4.5.5
          SOURCE="${SPELL}-${VERSION}.tar.gz"
   SOURCE_URL[0]=https://github.com/VirusTotal/yara/archive/refs/tags/v$VERSION.tar.gz
     SOURCE_HASH=sha512:e71d6e435cb2ad7b5875ccabcfe3abe42e2f37187a22e778867c5c5762134961369c2cbd4bea8da9193d5381af4569e39a50156d4077dc3a23b9a2240b741b60
SOURCE_DIRECTORY="${BUILD_DIRECTORY}/${SPELL}-${VERSION}"
        WEB_SITE="https://virustotal.github.io/yara/"
      LICENSE[0]=GPL
         ENTERED=20110920
           SHORT="malware research tool"
cat << EOF
YARA is a tool aimed at helping malware researchers to identify and classify
malware samples. With YARA you can create descriptions of malware families
based on textual or binary patterns contained on samples of those
families. Each description consists of a set of strings and a Boolean
expression which determines its logic.
EOF
