Arya - The Reverse YARA Logo

Arya - The Reverse YARA

0
Free
Visit Website

Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. It creates files that match your rules, making it a reverse YARA tool. Arya can be used for malware research, YARA rule QA testing, and pressure testing networks with code samples built from YARA rules.

FEATURES

ALTERNATIVES

A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence

A tool to fuzz query strings and identify vulnerabilities

Malware sandbox for executing malicious files in an isolated environment with advanced features.

Dynamic binary analysis library with various analysis and emulation capabilities.

Use FindYara, an IDA python plugin, to scan your binary with yara rules and quickly jump to matches.

A serverless, real-time, and retroactive malware detection tool that scans files with YARA rules and alerts incident response teams.

A suite of secret scanners built in Rust for performance.

A comprehensive guide to malware analysis and reverse engineering, covering topics such as lab setup, debugging, and anti-debugging.