A YARA rule generator for IDA Pro that matches basic blocks of the current function. It masks out relocation bytes and ignores jump instructions. If python-yara is installed, it validates that the generated rule matches at least one segment in the current file.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A program to manage yara ruleset in a database with support for different databases and configuration options.
A tool that extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
Joe Sandbox Community provides automated cloud-based malware analysis across multiple OS platforms.
A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.