Yara_fn IDAPython script Logo

Yara_fn IDAPython script

0
Free
Updated 11 March 2025
Visit Website

A YARA rule generator for IDA Pro that matches basic blocks of the current function. It masks out relocation bytes and ignores jump instructions. If python-yara is installed, it validates that the generated rule matches at least one segment in the current file.

FEATURES

SIMILAR TOOLS

VxSig is a tool to automatically generate AV byte signatures from similar binaries.

Dynamic binary analysis library with various analysis and emulation capabilities.

A PE/COFF file viewer that displays header, section, directory, import table, export table, and resource information within various file types.

A framework for creating XNU based rootkits for OS X and iOS security research

A Go library for manipulating YARA rulesets with the ability to programatically change metadata, rule names, and more.

A standalone binary inspection tool for Android developers with support for various formats and dependencies.

An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.

OCaml wrapper for YARA matching engine for malware identification

A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

Copyright © 2025 - All rights reserved