Yet another rule generator for Yara IDAPython plugin for generating whole Yara rules/patterns from x86/x86-64 code. Operation called 'parameterization' applies to selected code/function. This operation finds alternatives for any possible operands and creates a pattern based on that information. Tested on IDA 7.5+. Installation: Copy the plugin to your IDA_HOME/plugins folder and install dependencies using 'pip install capstone tabulate plyara'. According to the Intel manual, an instruction has the following structure: Instruction prefix, Opcode, Mod R/M, SIB, Displacement, Immediate value. The plugin parameterizes the REX prefix as '4?' and creates candidates for Mod R/M positions based on fixed Mod, Reg, and R/M settings. It generates 4 types of patterns: Mod | ??? | ???, Mod | REG | ???, Mod | REG | R/M, Mod | ??? | R/M.
FEATURES
ALTERNATIVES
API security platform that combines discovery, testing, and monitoring capabilities to identify and protect against API vulnerabilities throughout the development lifecycle.
cwe_checker is a suite of checks to detect common bug classes in ELF binaries using Ghidra for firmware analysis.
Reformat and re-indent bookmarklets, ugly JavaScript, and unpack scripts with options available via UI.
A technology lookup and lead generation tool that identifies the technology stack of any website and provides features for market research, competitor analysis, and data enrichment.
XSS Polyglot Challenge - XSS payload running in multiple contexts for testing XSS.
API Security is a comprehensive solution that provides continuous discovery, vulnerability assessment, threat detection, compliance monitoring, dynamic testing, and remediation capabilities to protect APIs against various threats and vulnerabilities.
Revelo is an experimental Javascript deobfuscator tool with features to analyze and deobfuscate Javascript code.
Tracee is a runtime security and observability tool using eBPF technology.
PINNED
InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.
System Two Security
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.
Aikido Security
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.
Permiso
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.
Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.