A YARA rule generator for IDA Pro that matches basic blocks of the current function. It masks out relocation bytes and ignores jump instructions. If python-yara is installed, it validates that the generated rule matches at least one segment in the current file.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
VxSig is a tool to automatically generate AV byte signatures from similar binaries.
Dynamic binary analysis library with various analysis and emulation capabilities.
A PE/COFF file viewer that displays header, section, directory, import table, export table, and resource information within various file types.
A framework for creating XNU based rootkits for OS X and iOS security research
A Go library for manipulating YARA rulesets with the ability to programatically change metadata, rule names, and more.
A standalone binary inspection tool for Android developers with support for various formats and dependencies.
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.