YARA IDA Processor
A tool for processing compiled YARA rules in IDA.
CAPE is a malware sandbox used to execute malicious files in an isolated environment, instrument their dynamic behavior, and collect forensic artifacts. It features behavioral instrumentation, file capture, network traffic capture, malware classification, screenshots, memory dumps, automated unpacking, YARA signature-based classification, configuration extraction, debugger automation, anti-sandbox countermeasures, instruction traces, and an interactive desktop. A free demonstration instance is available online for anyone to use.
A tool for processing compiled YARA rules in IDA.
Collects Yara rules from over 150 free resources, a free alternative to Valhalla.
A Python library to interface with a cuckoo-modified instance.
YARA extension for Visual Studio Code with code completion and snippets
Use FindYara, an IDA python plugin, to scan your binary with yara rules and quickly jump to matches.
A command-line program for finding secrets and sensitive information in textual data and Git history.