YARI - YARA Interactive Interactive debugger for the YARA language written in Rust. Debugger directly calls libyara avoiding emulation to get the most accurate results. 🚀 Features: Call functions from modules Get the value of module constants Evaluate complex expressions Check the matches of strings Support for external variables Integration with YARA Language Server For more information, check out: Blog post Wiki Installation To setup your environment please follow instructions from the YLS wiki. Interactive shell Binary accepts the same arguments as original yara binary. λ yari /bin/sh >> elf.number_of_sections Integer(26) >> License Copyright (c) 2022 Avast Software, licensed under the MIT license. See the LICENSE file for more details. YARI and its related projects uses third-party libraries or other resources listed, along with their licenses, in the yari-sys/LICENSE-THIRD-PARTY file. This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
Emulates Docker HTTP API with event logging and AWS deployment script.
FOCA is a tool used to find metadata and hidden information in scanned documents, with capabilities to analyze various file types and extract EXIF information.
Generates randomized C2 profiles for Cobalt Strike to evade detection.
A scripting engine for interacting with GraphQL endpoints for pentesting purposes.
A tool for testing Cross Site Scripting vulnerabilities
A blog post about abusing exported functions and exposed DCOM interfaces for pass-thru command execution and lateral movement