Hyara Logo

Hyara

0
Free
Updated 11 March 2025
Visit Website

Hyara is a plugin that provides convenience when writing YARA rules. When running Hyara, it docks itself to the right and the output window to the left, allowing users to specify addresses, view results, save results, clear rules, modify values to wildcards, export YARA rules, select start or end addresses, annotate instructions, add rich header and imphash matching, extract strings, and install in IDA Pro & BinaryNinja.

FEATURES

SIMILAR TOOLS

Detect capabilities in executable files and identify potential behaviors.

Fernflower is an analytical decompiler for Java with command-line options and support for external classes.

A native Python cross-version decompiler and fragment decompiler.

A backend agnostic debugger frontend for debugging binaries without source code access.

A Burp extension to check JWT tokens for potential weaknesses

A sandbox for quickly sandboxing known or unknown families of Android Malware

A dataset release policy for the Android Malware Genome Project, requiring authentication and justification for access to the dataset.

Interactive malware hunting service with live access to the heart of an incident.

Repository of TRISIS/TRITON/HatMan malware samples and decompiled sources targeting ICS Triconex SIS controllers.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved