Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. It creates files that match your rules, making it a reverse YARA tool. Arya can be used for malware research, YARA rule QA testing, and pressure testing networks with code samples built from YARA rules.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
An open source .NET deobfuscator and unpacker that restores packed and obfuscated assemblies by reversing various obfuscation techniques.
yextend extends Yara's functionality by automatically handling archived and compressed content inflation, enabling pattern matching on files buried within multiple layers of archives.
A program to manage yara ruleset in a database with support for different databases and configuration options.
A tool that extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.
A static analysis tool for PE files that identifies potential malicious indicators through compiler detection, packing analysis, signature matching, and suspicious string identification.
Joe Sandbox Community provides automated cloud-based malware analysis across multiple OS platforms.
Code to prevent a managed .NET debugger/profiler from working.