YARA IDA Processor Logo

YARA IDA Processor

0
Free
Updated 11 March 2025
Visit Website

Compiled YARA Rules Processor for IDA Loader and processor for YARA's compiled rule format. Installation: put the processor plugin in: <IDA_INSTALL_DIR>\procs\ and put the file loader in: <IDA_INSTALL_DIR>\loaders\. Requirements: IDA 7.0. Tested Versions: YARA 3.7.0, YARA 3.8.1. License: MIT 2018.

FEATURES

SIMILAR TOOLS

Pwndbg is a GDB plug-in that enhances the debugging experience for low-level software developers, hardware hackers, reverse-engineers, and exploit developers.

Search gadgets on binaries to facilitate ROP exploitation.

FSF is a modular, recursive file scanning solution that enables analysts to extend the utility of Yara signatures and define actionable intelligence within a file.

A collection of XSS payloads designed to turn alert(1) into P1

A tool to fuzz query strings and identify vulnerabilities

A PowerShell module for interacting with VirusTotal to analyze suspicious files and URLs.

A fast and simple DOM based XSS vulnerability scanner

A GitHub repository for fuzzing and testing file formats

A script to detect and remove Canary Tokens with simple signature-based detections.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved