ida_yara Logo

ida_yara

0
Free
Updated 11 March 2025
Visit Website

ida_yara is a Python script that can be used to scan data within an IDB using Yara. The code mimics IDA's find_text and find_binary. It creates the Yara signature based off of the search and its search flags. Usage: Same as IDA's find_text and find_binary. Example: ida_yara.yara_find_text(start_ea, y, x, ustr, sflag=0) ida_yara.yara_find_binary(start_ea, ubinstr, radix=16, sflag=0) Search Flags: SEARCH_UP = search up return single match SEARCH_DOWN = search down return single match SEARCH_UP|SEARCH_NEXT = return all up from ea with the order being closest to furthest SEARCH_DOWN|SEARCH_DOWN = return all down from ea SEARCH_DOWN = same as SEARCH_DOWN SEARCH_UNICODE = search for Unicode characters

FEATURES

SIMILAR TOOLS

A collection of YARA rules for public use, built from intelligence profiles and file work.

A tool for translating Dalvik bytecode to equivalent Java bytecode, allowing Java analysis tools to analyze Android applications.

YARA extension for Visual Studio Code with code completion and snippets

A tool for hacking and security testing of JWT

A tool that extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.

A tool designed to handle archive file data and augment Yara's capabilities.

A deserialization payload generator for .NET formatters

RABCDAsm is a collection of utilities for ActionScript 3 assembly/disassembly and SWF file manipulation.

A multithreaded YARA scanner for incident response or malware zoos.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved