IDA_scripts IDA Python scripts are a collection of scripts that can be used to automate tasks and enhance the functionality of IDA Pro, a popular disassembler. These scripts can be used to perform various tasks such as data analysis, code manipulation, and automation of repetitive tasks. They can be used to create custom plugins and extend the functionality of IDA Pro. The scripts are written in Python and can be easily integrated with other tools and scripts. They are a powerful tool for any IDA Pro user, from beginners to advanced users.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A collection of Yara signatures for identifying malware and other threats
An advanced cross-platform tool for detecting and exploiting SQL injection security flaws
A semi-automatic tool to generate YARA rules from virus samples.
A Windows context menu integration tool that scans files and folders for malware patterns, crypto signatures, and malicious documents using Yara rules and PEID signatures.
A dataset release policy for the Android Malware Genome Project, requiring authentication and justification for access to the dataset.
A tool to help exploit XXE vulnerabilities by sending a crafted XML file to the server and parsing it to extract the data.
A strings statistics calculator for YARA rules to aid malware research.
Largest open collection of Android malware samples, with 298 samples and contributions welcome.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.