Automatic YARA rule generation tool used to build YARA signatures for malware repositories, limited to x86/x86-64 executables and memory dumps for Linux, macOS, and Windows. Requires a curated malware repository with disassembly reports as input files.
FEATURES
SIMILAR TOOLS
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
A collaborative malware analysis framework with various features for automated analysis tasks.
A .NET assembly debugger and editor that enables reverse engineering and dynamic analysis of compiled .NET applications without source code access.
Code to prevent a managed .NET debugger/profiler from working.
A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.
Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.
A sandbox for quickly sandboxing known or unknown families of Android Malware
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.