AutoYara Logo

AutoYara

AutoYara is a Java tool that automatically generates YARA rules from malware samples using biclustering algorithms to help analysts create detection rules for malware families.

Visit Website
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

AutoYara Description

AutoYara is a Java-based tool that implements an algorithm for automatic YARA rule generation using biclustering techniques. The tool analyzes input files belonging to a specific malware family and creates YARA rules from the provided samples. The tool can operate with as few as 2 sample files and aims to achieve low false positive rates in rule generation. It accepts individual files or entire folders as input, processing files recursively when a directory is provided. Multiple input sources can be specified using multiple -i arguments. AutoYara requires Java 11 or greater to run and outputs generated rules to the current directory by default. Users can customize the output location and filename using the --out parameter. The tool is designed to assist security analysts by automating rule creation for common malware families, allowing them to focus on more complex samples that require manual analysis. The implementation is based on research from the paper "Automatic Yara Rule Generation Using Biclustering" and is provided as research code without warranty or support. A pre-built binary is available for download from the project's release section.

AutoYara FAQ

Common questions about AutoYara including features, pricing, alternatives, and user reviews.

AutoYara is AutoYara is a Java tool that automatically generates YARA rules from malware samples using biclustering algorithms to help analysts create detection rules for malware families.. It is a Security Operations solution designed to help security teams with Research, YARA, Signature Generation.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

Cythereal MAGIC™ Logo

Malware hunting platform that auto-generates YARA rules from shared code analysis.

0
YARA-Signator Logo

Automatic YARA rule generation for malware repositories.

0
Binsequencer Logo

Binsequencer automatically generates YARA detection rules by analyzing collections of similar malware samples and identifying common x86 instruction sequences across the corpus.

0
Yara_fn IDAPython script Logo

An IDAPython script that generates YARA rules for basic blocks of the current function in IDA Pro, with automatic masking of relocation bytes and optional validation against file segments.

0
base64_substring Logo

A tool that generates YARA rules to search for specific terms within base64-encoded malware samples by enumerating all possible encoding variations.

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox