Note, that it can be integrated with radare2[1], the reverse engineering framework and toolset. The integration will allow you to apply and generate YARA signatures from within. There are two plugins - to use radare2 from Yara[2], and Yara from radare2[3]. The second one you can install using the embedded r2 package manager: `r2pm -i yara`
Fun fact: XProtect on macOS uses YARA to match known malicious software. The database is at /System/Library/CoreServices/XProtect.bundle/Contents/Resources/XProtect.yara if you'd like to look at it yourself.
YARA reminds me of the venerable "file" utility, and I wonder if YARA could be used in place of it to identify non-malware files that "file" has trouble identifying.
"site:github.com filetype:yar" usually yields a few good ones. It's probably easier if you're more specific as to which specific use case you have in mind.
[1] https://github.com/radareorg/radare2
[2] https://r2yara.readthedocs.io/en/latest/
[3] https://github.com/radareorg/radare2-extras/tree/master/yara