Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.
Reach out!
An open-source binary debugger for Windows with a comprehensive plugin system for malware analysis and reverse engineering.
A malware/botnet analysis framework with a focus on network analysis and process comparison.
Dynamic binary analysis library with various analysis and emulation capabilities.
Pwndbg is a GDB plug-in that enhances the debugging experience for low-level software developers, hardware hackers, reverse-engineers, and exploit developers.
Generates a YARA rule to match basic blocks of the current function in IDA Pro
A malware processing and analytics tool that utilizes Pig, Django, and Elasticsearch to analyze and visualize malware data.
angr is a Python 3 library for binary analysis with various capabilities like symbolic execution and decompilation.
Generate Yara rules from function basic blocks in x64dbg.
BARF is an open source binary analysis framework for supporting various binary code analysis tasks in information security.
A minimal library to generate YARA rules from JAVA with maven support.
PLASMA is an interactive disassembler with support for various architectures and formats, offering a Python API for scripting.
A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.
Andromeda makes reverse engineering of Android applications faster and easier.
Automate the process of writing YARA rules based on executable code within malware.
A .Net wrapper library for the native Yara library with interoperability and portability features.
A collection of reverse engineering challenges covering a wide range of topics and difficulty levels.
Binary Ninja is an interactive decompiler, disassembler, debugger, and binary analysis platform with a focus on automation and a clean GUI.
Yabin creates Yara signatures from malware to find similar samples.
A 32-bit assembler level analyzing debugger for Microsoft Windows.
A disassembly framework with support for multiple hardware architectures and clean API.
Automatic YARA rule generation for malware repositories.
Yara module for Node.js
YARA module for supporting DCSO format bloom filters with hashlookup capabilities.
Bindings for the Yara library from VirusTotal with support for Yara v4.2 and various features like rule compilation and scanning.
YARA is a tool for identifying and classifying malware samples based on textual or binary patterns.
Search gadgets on binaries to facilitate ROP exploitation.
dynStruct is a tool for monitoring memory accesses of an ELF binary and recovering structures of the original code.
A new age tool for binary analysis that uses statistical visualizations to help find patterns in large amounts of binary data.
Go bindings for YARA with installation and build instructions.
A collection of Yara signatures for identifying malware and other threats
Standalone graphical utility for viewing Java source codes from ".class" files.
A backend agnostic debugger frontend for debugging binaries without source code access.
A Python script for scanning data within an IDB using Yara
Python 3 tool for parsing Yara rules with ongoing development.
A library for running basic functions from stripped binaries cross platform.
Leading open source automated malware analysis system.
A collaborative malware analysis framework with various features for automated analysis tasks.
Fernflower is an analytical decompiler for Java with command-line options and support for external classes.
Binary analysis and management framework for organizing malware and exploit samples.
Repository of TRISIS/TRITON/HatMan malware samples and decompiled sources targeting ICS Triconex SIS controllers.
A tool for processing compiled YARA rules in IDA.
Use FindYara, an IDA python plugin, to scan your binary with yara rules and quickly jump to matches.