Hyara Logo

Hyara

0
Free
Visit Website

Hyara is a plugin that provides convenience when writing YARA rules. When running Hyara, it docks itself to the right and the output window to the left, allowing users to specify addresses, view results, save results, clear rules, modify values to wildcards, export YARA rules, select start or end addresses, annotate instructions, add rich header and imphash matching, extract strings, and install in IDA Pro & BinaryNinja.

FEATURES

ALTERNATIVES

VolatilityBot automates binary extraction and memory analysis, including detecting code injections and strings.

A simple XSS scanner tool for identifying Cross-Site Scripting vulnerabilities

A framework for reverse engineering Flutter apps with modified Flutter library for dynamic analysis and traffic monitoring.

A freeware suite of tools for PE editing and process viewing, including CFF Explorer and Resource Editor.

A collection of YARA rules for public use, built from intelligence profiles and file work.

A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.

A Python script that converts shellcode into a PE32 or PE32+ file.

Python 3 tool for parsing Yara rules with ongoing development.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved