YARI Logo

YARI

0
Free
Visit Website

YARI - YARA Interactive Interactive debugger for the YARA language written in Rust. Debugger directly calls libyara avoiding emulation to get the most accurate results. 🚀 Features: Call functions from modules Get the value of module constants Evaluate complex expressions Check the matches of strings Support for external variables Integration with YARA Language Server For more information, check out: Blog post Wiki Installation To setup your environment please follow instructions from the YLS wiki. Interactive shell Binary accepts the same arguments as original yara binary. λ yari /bin/sh >> elf.number_of_sections Integer(26) >> License Copyright (c) 2022 Avast Software, licensed under the MIT license. See the LICENSE file for more details. YARI and its related projects uses third-party libraries or other resources listed, along with their licenses, in the yari-sys/LICENSE-THIRD-PARTY file. This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)

FEATURES

ALTERNATIVES

A comprehensive .NET post-exploitation library designed for advanced security testing.

A tool for iOS pentesting and research with a GUI version available.

A simple file format fuzzer for Android that can fuzz multiple readers at once

A Burp Suite extension for sending large numbers of HTTP requests and analyzing the results.

Python-based toolkit for network hacking with various implemented techniques and supported by Securetia SRL.

A script to enumerate Google Storage buckets and determine access and privilege escalation

Interactive online malware sandbox for real-time analysis and threat intelligence

A C/C++ tool for remote process injection, supporting x64 and x86 operations, with system call macros generated by SysWhispers script.

PINNED