Arya - The Reverse YARA Logo

Arya - The Reverse YARA

0
Free
Visit Website

Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. It creates files that match your rules, making it a reverse YARA tool. Arya can be used for malware research, YARA rule QA testing, and pressure testing networks with code samples built from YARA rules.

FEATURES

ALTERNATIVES

A native Python cross-version decompiler and fragment decompiler.

A tool to fuzz query strings and identify vulnerabilities

A Python script that converts shellcode into a PE32 or PE32+ file.

ILSpy is the open-source .NET assembly browser and decompiler with various decompiler frontends and features.

Repository of TRISIS/TRITON/HatMan malware samples and decompiled sources targeting ICS Triconex SIS controllers.

A strings statistics calculator for YARA rules to aid malware research.

Multi-cloud antivirus scanning API with CLAMAV and YARA support for AWS S3, Azure Blob Storage, and GCP Cloud Storage.

OCaml wrapper for YARA matching engine for malware identification