Yara_fn IDAPython script Logo

Yara_fn IDAPython script

0
Free
Visit Website

A YARA rule generator for IDA Pro that matches basic blocks of the current function. It masks out relocation bytes and ignores jump instructions. If python-yara is installed, it validates that the generated rule matches at least one segment in the current file.

FEATURES

ALTERNATIVES

A tool for deep analysis of malicious files using ClamAV and YARA rules, with features like scoring suspect files, building visual tree graphs, and extracting specific patterns.

A native Python cross-version decompiler and fragment decompiler.

A script to detect and remove Canary Tokens with simple signature-based detections.

GuardDog is a CLI tool for identifying malicious PyPI and npm packages through heuristics and Semgrep rules.

Automated blind-xss search for Burp Suite

Holistic malware analysis platform with interactive sandbox, static analyzer, and emulation capabilities.

A cutting-edge AI-based IT security platform that identifies malware and cyber-attacks within seconds

A PowerShell obfuscation detection framework designed to highlight the limitations of signature-based detection and provide a scalable means of detecting known and unknown obfuscation techniques.