YarG for Yara Logo

YarG for Yara

0
Free
Visit Website

Yet another rule generator for Yara IDAPython plugin for generating whole Yara rules/patterns from x86/x86-64 code. Operation called 'parameterization' applies to selected code/function. This operation finds alternatives for any possible operands and creates a pattern based on that information. Tested on IDA 7.5+. Installation: Copy the plugin to your IDA_HOME/plugins folder and install dependencies using 'pip install capstone tabulate plyara'. According to the Intel manual, an instruction has the following structure: Instruction prefix, Opcode, Mod R/M, SIB, Displacement, Immediate value. The plugin parameterizes the REX prefix as '4?' and creates candidates for Mod R/M positions based on fixed Mod, Reg, and R/M settings. It generates 4 types of patterns: Mod | ??? | ???, Mod | REG | ???, Mod | REG | R/M, Mod | ??? | R/M.

FEATURES

ALTERNATIVES

A comprehensive cheatsheet for XSS filter evasion techniques.

ThreatLocker is an enterprise cybersecurity platform that provides comprehensive endpoint protection and zero-trust security to prevent ransomware, viruses, and other malicious software from running on endpoints.

An automated code security tool that analyzes repositories, identifies vulnerabilities, and generates pull requests with fixes while integrating with existing development workflows.

An API security solution that provides continuous discovery, classification, and protection of APIs across environments while integrating with existing security infrastructure to prevent attacks and business logic abuse.

Identifies misconfigured CloudFront domains vulnerable to hijacking

Dynamic application security testing tool for identifying and fixing web application vulnerabilities.

Cutting-edge technology for developing security applications within the Linux kernel.

A security feature to prevent unexpected manipulation of fetched resources.