FARA Logo

FARA

0
Free
Visit Website

FARA, or Faux YARA, is a simple repository that contains a set of purposefully erroneous Yara rules. It is meant as a training vehicle for new security analysts, those that are new to Yara and even Yara veterans that want to keep their rule writing (and debugging) sharp. If you're here, you already know what Yara is, but if not, do visit Yara's Github repository: https://github.com/VirusTotal/yara. How do I use FARA? Very simple, download or clone the repo and start figuring out what is wrong with each and every Yara rule! Errors may have been created on the following levels: - Syntax - Logical - Runtime - Semantic - Efficiency or effectiveness - Others... How do I actually test these rules? There's a few methods: - Go hardcore and just look at them in your favourite text editor. Don't use syntax highlighting as an additional challenge. - The easiest and best way: try to run them with Yara (use the latest available stable version) and make way from there. - You can use/try Florian Roth's yaraQA: https://github.com/Neo23x0/yaraQA - In addition, you can also clone this repo, then run YARA-CI on it: https://yara-ci.cloud.virustotal.com/. If you want an example of how Yara-CI can help, h

FEATURES

ALTERNATIVES

Java MODBUS simulator with scriptable functions and dynamic resource creation.

Free training sessions on Reverse Engineering, Malware Analysis, and Exploit Development.

A comprehensive list of search filters for the SHODAN search engine.

Online hacking game with realistic hacking experience and player interaction.

Best practices for corporate network segmentation to protect against basic targeted attacks

A comprehensive guide to developing an incident response capability through intelligence-based threat hunting, covering theoretical concepts and real-life scenarios.

Cybrary is an online learning platform that provides accessible and affordable training in cybersecurity skills.

Comprehensive reference guide for bug bounty hunters with detailed information on various vulnerabilities, platforms, tools, and best practices.

PINNED