Anya analyses binary files without executing them. Drop a PE or ELF onto the GUI, or pipe files through the CLI. Get hashes, entropy, imports, sections, IOC indicators, MITRE ATT&CK mappings, a confidence-scored verdict, and a risk score. All in under seconds, all locally.
Anya (AHN-yah) means "eye" in Igbo.
curl -fsSL https://raw.githubusercontent.com/elementmerc/anya/master/install.sh | bashPrompts for CLI, GUI, or both. No root required for CLI.
| Platform | CLI | GUI |
|---|---|---|
| Linux x86_64 | .tar.gz + musl |
.AppImage / .deb |
| Linux arm64 | .tar.gz + musl |
— |
| macOS (Intel + Apple Silicon) | Universal binary | .dmg (universal) |
| Windows x86_64 | .zip |
.msi |
| Docker | linux/amd64 + linux/arm64 |
— |
docker pull elementmerc/anya:latest
docker run --rm \
-v "$(pwd)/samples:/samples:ro" \
elementmerc/anya:latest \
--file /samples/malware.exe --json# CLI (requires Rust 1.85+)
cargo install anya-security-core --locked
# GUI (requires Node 22 + Tauri prerequisites)
npm ci && npm run tauri build# Analyse a file
anya --file suspicious.exe
# JSON output
anya --file suspicious.exe --json
# Batch scan
anya --directory ./samples --recursive --json --output results.jsonl --append
# Teacher Mode (guided lessons inline)
anya --file suspicious.exe --guided
# Random Bible verse
anya verse
# Init config
anya --init-config
# Verdict + explanations
anya --file suspicious.exe --explain
# Batch summary table
anya --directory ./samples --recursive --summary
# Check hash against known-bad list
anya hash-check suspicious.exe --against known-bad.txt
# Generate YARA rule from strings
anya yara from-strings strings.txt --output rule.yar
# Combine YARA rules
anya yara combine ./rules combined.yar --recursive
# Save to investigation case
anya --file suspicious.exe --case operation-nightfall
# List cases
anya cases --listFull flag reference: anya --help
Launch Anya, drag a file onto the drop zone. Seven tabs:
| Tab | What it shows |
|---|---|
| Overview | Risk score, file metadata, SHA-256 |
| Entropy | Full entropy chart + per-section breakdown |
| Imports | DLL tree with expandable function lists and inline explanations |
| Sections | W+X detection, per-section entropy, characteristics |
| Strings | Extracted strings with IOC classification and category filtering |
| Security | ASLR, DEP, version info, signed status |
| MITRE | Mapped ATT&CK techniques with tactic tagging |
Teacher Mode (toggle in Settings → Learning) surfaces contextual lessons as you navigate findings. Bible Verses (same section) shows a rotating NLT verse in the status bar.
Analysis history is stored in a local SQLite database. Nothing leaves your device.
| Anya | VirusTotal | Ghidra | CAPA | |
|---|---|---|---|---|
| Offline | ✓ | ✗ | ✓ | ✓ |
| No cloud upload | ✓ | ✗ | ✓ | ✓ |
| Desktop GUI | ✓ | Browser | ✓ | ✗ |
| < 1 s analysis | ✓ | Network-bound | ✗ | Seconds |
| MITRE mapping | ✓ | Partial | ✗ | ✓ |
| Beginner-friendly | ✓ | — | ✗ | — |
| IOC extraction | ✓ | ✓ | ✗ | Partial |
- Architecture
- JSON output schema
- CHANGELOG
- Security scope & limitations
- Privacy policy
- Commercial licensing
- Windows: Use Add/Remove Programs — the uninstaller launches automatically.
- Linux:
sudo apt remove anya— the uninstaller runs during removal. - macOS: Drag Anya.app to the Trash, then optionally run:
~/Applications/Anya.app/Contents/MacOS/anya-gui --uninstallto remove your analysis database and preferences.
AGPL-3.0-or-later. See LICENSE.TXT.
Commercial licensing: daniel@themalwarefiles.com
