ida_yara Logo

ida_yara

0
Free
Visit Website

ida_yara is a Python script that can be used to scan data within an IDB using Yara. The code mimics IDA's find_text and find_binary. It creates the Yara signature based off of the search and its search flags. Usage: Same as IDA's find_text and find_binary. Example: ida_yara.yara_find_text(start_ea, y, x, ustr, sflag=0) ida_yara.yara_find_binary(start_ea, ubinstr, radix=16, sflag=0) Search Flags: SEARCH_UP = search up return single match SEARCH_DOWN = search down return single match SEARCH_UP|SEARCH_NEXT = return all up from ea with the order being closest to furthest SEARCH_DOWN|SEARCH_DOWN = return all down from ea SEARCH_DOWN = same as SEARCH_DOWN SEARCH_UNICODE = search for Unicode characters

FEATURES

ALTERNATIVES

Kaitai Struct is a declarative language for describing binary data structures.

Largest open collection of Android malware samples, with 298 samples and contributions welcome.

Joe Sandbox Community provides automated cloud-based malware analysis across multiple OS platforms.

A collection of Yara rules for identifying malicious PEs with unique or suspicious PDB paths.

TeamTNT is modifying its malicious shell scripts after they were made public by security researchers.

Python wrapper for the Libemu library for analyzing shellcode.

Redexer is a reengineering tool for Android app binaries with features like RefineDroid and Dr. Android.

A Python library for automating time-based blind SQL injection attacks

PINNED