
Top picks: Fnord, RevEng.AI, Yara Pattern Scanner — plus 45 more compared.
Security Operationsfindcrypt-yara is a free tool. Security professionals most commonly compare it with . All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to findcrypt-yara, including their key features and shared capabilities.
Fnord is a pattern extraction tool that analyzes obfuscated code using sliding window techniques to identify frequent byte sequences and generate experimental YARA rules for malware analysis.
Shares 4 capabilities with findcrypt-yara: Reverse Engineering, Binary Analysis, YARA, Pattern Matching
AI-powered binary analysis platform for reverse engineering & malware analysis.
Shares 3 capabilities with findcrypt-yara: Reverse Engineering, Binary Analysis, YARA
A Windows context menu integration tool that scans files and folders for malware patterns, crypto signatures, and malicious documents using Yara rules and PEID signatures.
Shares 3 capabilities with findcrypt-yara: Binary Analysis, YARA, Pattern Matching
A collection of YARA rules specifically designed for forensic investigations and malware analysis, providing pattern matching capabilities for files and memory dumps.
Shares 3 capabilities with findcrypt-yara: Binary Analysis, YARA, Pattern Matching
A command-line tool that visually displays YARA rule matches, regex matches, and hex patterns in binary data with colored output and configurable context bytes.
Shares 3 capabilities with findcrypt-yara: Binary Analysis, YARA, Pattern Matching
Malware analysis platform for SOC teams with binary analysis and threat detection
Plugin that decompiles malware PE files into readable C code using hybrid analysis.
Agentic AI tool for automated malware reverse engineering & phishing analysis.
Fnord is a pattern extraction tool that analyzes obfuscated code using sliding window techniques to identify frequent byte sequences and generate experimental YARA rules for malware analysis.
AI-powered binary analysis platform for reverse engineering & malware analysis.
A Windows context menu integration tool that scans files and folders for malware patterns, crypto signatures, and malicious documents using Yara rules and PEID signatures.
A collection of YARA rules specifically designed for forensic investigations and malware analysis, providing pattern matching capabilities for files and memory dumps.
A command-line tool that visually displays YARA rule matches, regex matches, and hex patterns in binary data with colored output and configurable context bytes.
Malware analysis platform for SOC teams with binary analysis and threat detection
Plugin that decompiles malware PE files into readable C code using hybrid analysis.
Agentic AI tool for automated malware reverse engineering & phishing analysis.
AI-powered malware analysis & threat research platform with chat interface.
An open source .NET deobfuscator and unpacker that restores packed and obfuscated assemblies by reversing various obfuscation techniques.
Binwalk is a firmware analysis tool that enables reverse engineering and extraction of embedded file systems and archives from firmware images.
OCyara performs OCR on images and PDF files to extract text content and scan it against Yara rules for malware detection.
Fast disassembler producing reassemblable assembly code using Datalog
A static analysis tool for PE files that identifies potential malicious indicators through compiler detection, packing analysis, signature matching, and suspicious string identification.
edb is a powerful debugger for Linux binaries, enhancing reverse engineering efforts with a user-friendly interface and extensible plugins.
A .NET assembly debugger and editor that enables reverse engineering and dynamic analysis of compiled .NET applications without source code access.
yextend extends Yara's functionality by automatically handling archived and compressed content inflation, enabling pattern matching on files buried within multiple layers of archives.
Python 3 tool for parsing Yara rules with ongoing development.
A collection of YARA rules designed to identify files containing sensitive information such as usernames, passwords, and credit card numbers for penetration testing and forensic analysis.
A command-line string extraction utility for digital forensics that supports ASCII and Unicode string extraction from files and directories with pattern matching and filtering capabilities.
Dynamic binary analysis library with various analysis and emulation capabilities.
Ghidra is an NSA-developed software reverse engineering framework that provides disassembly, decompilation, and analysis tools for examining compiled code across multiple platforms and processor architectures.
Use FindYara, an IDA python plugin, to scan your binary with yara rules and quickly jump to matches.
An OCaml Ctypes wrapper for the YARA matching engine that enables malware identification capabilities in OCaml applications.
A .Net wrapper library for the native Yara library with interoperability and portability features.
A Python script for scanning data within an IDB using Yara
A disassembly framework with support for multiple hardware architectures and clean API.
RetDec is an LLVM-based decompiler that converts machine code from various architectures and file formats back into readable C-like source code for reverse engineering and malware analysis.
A tool for processing compiled YARA rules in IDA.
A Python wrapper for the Libemu library that enables shellcode analysis and malicious code examination through programmatic interfaces.
A C library that enables cross-platform execution of functions from stripped binaries using file names, offsets, and function signatures.
A minimal library to generate YARA rules from JAVA with maven support.
VxSig is a Google-developed tool that automatically generates antivirus byte signatures from similar binaries for Yara and ClamAV detection engines.
YARA module for supporting DCSO format bloom filters with hashlookup capabilities.
PINT is a PIN tool that enables Lua scripting for Intel's PIN dynamic instrumentation framework, allowing researchers to inject custom code during binary analysis processes.
Go bindings for YARA with installation and build instructions.
A command-line tool that parses Google Protobuf encoded data without schema definitions and displays the content in a readable, colored format.
PLASMA is an interactive disassembler that generates readable assembly code with colored syntax for reverse engineering binary files across multiple architectures and formats.
A declarative language for describing binary data structures that compiles into parsers for multiple programming languages.
FLOSS is a static analysis tool that automatically extracts and deobfuscates hidden strings from malware binaries using advanced analysis techniques.
A command-line tool for analyzing and extracting detailed information from Windows Portable Executable (PE) files.
VolatilityBot automates memory dump analysis by extracting executables, detecting code injections, and performing automated malware scanning using YARA and ClamAV.
Generate Yara rules from function basic blocks in x64dbg.
Binkit is a binary analysis tool that merged with DarunGrim and incorporates its analysis algorithms, currently in internal testing before official release.
Interactive incremental disassembler with data/control flow analysis capabilities.
BARF is an open source binary analysis framework for supporting various binary code analysis tasks in information security.
Common questions security professionals ask when evaluating alternatives and competitors to findcrypt-yara.
The most popular alternatives to findcrypt-yara include Fnord, RevEng.AI, Yara Pattern Scanner, YARA-Forensics, and YARALYZER. These Digital Forensics and Incident Response tools offer similar capabilities and are frequently compared by security professionals evaluating their options.