ida_yara

ida_yara

#Security Testing#Malware Analysis

A library for running basic functions from stripped binaries cross platform.

Visit Website

ida_yara: A Python Script for Scanning IDB Data with Yara

ida_yara is a Python script designed to scan data within an IDB file using Yara.

The code replicates IDA's find_text and find_binary functions

The code replicates IDA's find_text and find_binary functions, allowing for efficient searching of text and binary data.

Creating a Yara Signature

This function generates a Yara signature based on the specified search parameters and their corresponding flags. Usage: This is similar to IDA's find_text and find_binary functions. Example: ida_yara.yara_find_text(start_ea, y, x, ustr, sflag=0) ida_yara.yara_find_binary(start_ea, ubinstr, radix=16, sflag=0) Search Flags: - SEARCH_UP: Searches upwards and returns a single match. - SEARCH_DOWN: Searches downwards and returns a single match. - SEARCH_UP|SEARCH_NEXT: Returns all matches above the effective address (ea), ordered from closest to furthest. - SEARCH_DOWN|SEARCH_DOWN: Returns all matches below the effective address (ea). - SEARCH_DOWN: Functions the same as SEARCH_DOWN. - SEARCH_UNICODE: Searches for Unicode characters.