Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. It creates files that match your rules, making it a reverse YARA tool. Arya can be used for malware research, YARA rule QA testing, and pressure testing networks with code samples built from YARA rules.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Malware sandbox for executing malicious files in an isolated environment with advanced features.
Binwalk is a tool for analyzing, reverse engineering, and extracting firmware images with security and Python 2.7 deprecation notices.
Checksec is a bash script to check the properties of executables like PIE, RELRO, Canaries, ASLR, Fortify Source.
Command line tool for testing CRLF injection on a list of domains.
A collection of Android Fakebank and Tizi samples for analyzing spyware on Android devices.
A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.