ida-yara-processor
Rule processor
A tool that processes and executes compiled YARA rules within an IDA disassembler environment.
IDA Processor for Compiled YARA Rules
29 stars
2 watching
4 forks
Language: Python
last commit: about 6 years ago
Linked from 1 awesome list
disassembleridaidapython-pluginyarayara-rules
Related projects:
Repository | Description | Stars |
---|---|---|
| A Python tool to parse and represent Yara rules in a structured format | 8 |
| A plugin for multiple reverse engineering tools to generate YARA rules | 224 |
| An application backend designed to facilitate Yara rule analysis and root cause identification in malware detection. | 24 |
| A tool for scanning binary data in IDA using Yara signatures | 22 |
| A plugin for IDA Python that scans binaries with Yara rules and lists matches with offsets | 171 |
| Analyzes and reports on Yara rules and files | 362 |
| A repository of custom Yara rules for malware analysis and threat intelligence | 18 |
| A tool to parse YARA rules into a dictionary representation for easier operations and analysis. | 175 |
| A web interface for managing Yara rules and related data | 191 |
| A tool that generates Yara rules from x86/x86-64 code by analyzing instruction structures and parameters. | 25 |
| A collection of YARA rules based on intelligence profiles and file work. | 19 |
| A repository of pre-defined YARA rules for detecting malware and other malicious software | 126 |
| Provides Yara rules to identify malicious software in web applications | 44 |
| Generates YARA rules from malware strings while excluding goodware strings and optionally refines the rules for AI use. | 1,569 |
| A collection of YARA rules used to identify malicious patterns in binary files | 62 |