Yara Decompressor Logo

Yara Decompressor

0
Free
Updated 11 March 2025
Visit Website

For when your malware samples are stored compressed, but you still want to run rules against them. Currently supports: GZip, BZip2, LZMA (XZ). Modules used: Go-Yara: https://github.com/hillu/go-yara, XZ: https://github.com/ulikunitz/xz. Motivation: I've had to test Yara rules with compressed malware on systems with or without Yara installed. Compiled statically against libyara for ease of use. Currently runs a rule file against a directory of files. Future thoughts: Support for files in Zip and Tar archives, password-protected Zip and 7z files, and testing common passwords.

FEATURES

SIMILAR TOOLS

A tool that executes programs in memory from various sources

VxSig is a tool to automatically generate AV byte signatures from similar binaries.

Generate Yara rules from function basic blocks in x64dbg.

Find exploits in local and online databases instantly

Microservice for scanning files with Yara

An online hash checker utility that retrieves information from various online sources, including Virustotal, HybridAnalysis, and more.

angr is a Python 3 library for binary analysis with various capabilities like symbolic execution and decompilation.

Tplmap is a tool for detecting and exploiting server-side template injection vulnerabilities.

Repository of TRISIS/TRITON/HatMan malware samples and decompiled sources targeting ICS Triconex SIS controllers.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

Copyright © 2025 - All rights reserved