Visit Website

Compiled YARA Rules Processor for IDA Loader and processor for YARA's compiled rule format. Installation: put the processor plugin in: <IDA_INSTALL_DIR>\procs\ and put the file loader in: <IDA_INSTALL_DIR>\loaders\. Requirements: IDA 7.0. Tested Versions: YARA 3.7.0, YARA 3.8.1. License: MIT 2018.

FEATURES

ALTERNATIVES

A tool for reading Portable Executable (PE) files with detailed information about the file structure.

A collection of reverse engineering challenges covering a wide range of topics and difficulty levels.

A Burp plugin for identifying potential vulnerabilities in web applications

A disassembly framework with support for multiple hardware architectures and clean API.

A freeware suite of tools for PE editing and process viewing, including CFF Explorer and Resource Editor.

A simple framework for extracting actionable data from Android malware

YARA syntax highlighting for Gtk-based text editors

IDA Pro plugin for finding crypto constants

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved