YARI Logo

YARI

0
Free
Visit Website

YARI - YARA Interactive Interactive debugger for the YARA language written in Rust. Debugger directly calls libyara avoiding emulation to get the most accurate results. 🚀 Features: Call functions from modules Get the value of module constants Evaluate complex expressions Check the matches of strings Support for external variables Integration with YARA Language Server For more information, check out: Blog post Wiki Installation To setup your environment please follow instructions from the YLS wiki. Interactive shell Binary accepts the same arguments as original yara binary. λ yari /bin/sh >> elf.number_of_sections Integer(26) >> License Copyright (c) 2022 Avast Software, licensed under the MIT license. See the LICENSE file for more details. YARI and its related projects uses third-party libraries or other resources listed, along with their licenses, in the yari-sys/LICENSE-THIRD-PARTY file. This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)

FEATURES

ALTERNATIVES

Phrack Magazine is a digital magazine that focuses on computer security and hacking, featuring articles, interviews, and tutorials on various topics related to computer security.

AzureC2Relay enhances security by validating and relaying Cobalt Strike beacon traffic through Azure Functions.

Participation in the Red Team for Pacific Rim CCDC 2017 with insights on infrastructure design and competition tips.

A standard for conducting penetration tests, covering seven main sections from planning to reporting.

A command that builds and executes command lines from standard input, allowing for the execution of commands with multiple arguments.

A Linux-based environment for penetration testing and vulnerability exploitation

A guide to bypassing RFID card reader security mechanisms using specialized hardware

CrossC2 enables generation of cross-platform payloads for CobaltStrike, enhancing operational flexibility.