YARA IDA Processor Logo

YARA IDA Processor

0
Free
Visit Website

Compiled YARA Rules Processor for IDA Loader and processor for YARA's compiled rule format. Installation: put the processor plugin in: <IDA_INSTALL_DIR>\procs\ and put the file loader in: <IDA_INSTALL_DIR>\loaders\. Requirements: IDA 7.0. Tested Versions: YARA 3.7.0, YARA 3.8.1. License: MIT 2018.

FEATURES

ALTERNATIVES

Identifies 137 malicious npm packages and gathers system information to a remote server.

A Django web interface for managing Yara rules with features like search, categorization, and bulk edits.

A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.

A powerful tool for detecting and identifying malware using a rule-based system.

A tool for translating Dalvik bytecode to Java bytecode for analyzing Android applications.

A minimal library to generate YARA rules from JAVA with maven support.

Repository of TRISIS/TRITON/HatMan malware samples and decompiled sources targeting ICS Triconex SIS controllers.

Python wrapper for Android APK decompilation with various converter and decompiler options.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved