FARA Logo

FARA

0
Free
Updated 11 March 2025
Visit Website

FARA, or Faux YARA, is a simple repository that contains a set of purposefully erroneous Yara rules. It is meant as a training vehicle for new security analysts, those that are new to Yara and even Yara veterans that want to keep their rule writing (and debugging) sharp. If you're here, you already know what Yara is, but if not, do visit Yara's Github repository: https://github.com/VirusTotal/yara. How do I use FARA? Very simple, download or clone the repo and start figuring out what is wrong with each and every Yara rule! Errors may have been created on the following levels: - Syntax - Logical - Runtime - Semantic - Efficiency or effectiveness - Others... How do I actually test these rules? There's a few methods: - Go hardcore and just look at them in your favourite text editor. Don't use syntax highlighting as an additional challenge. - The easiest and best way: try to run them with Yara (use the latest available stable version) and make way from there. - You can use/try Florian Roth's yaraQA: https://github.com/Neo23x0/yaraQA - In addition, you can also clone this repo, then run YARA-CI on it: https://yara-ci.cloud.virustotal.com/. If you want an example of how Yara-CI can help, h

FEATURES

SIMILAR TOOLS

IT certification training for CompTIA exams with free resources.

Haaukins is an automated virtualization platform for cybersecurity education with a focus on capture the flag concept.

Level 400 training to become a Microsoft Sentinel Ninja.

A comprehensive guide to memory forensics, covering tools, techniques, and procedures for analyzing volatile memory.

A comprehensive guide to understanding and responding to modern ransomware attacks, covering incident response, cyber threat intelligence, and forensic analysis.

Boston Key Party CTF 2013 - cybersecurity competition with challenges in various domains.

An annual jeopardy-style capture-the-flag contest with challenges related to cybersecurity.

A non-commercial wargame site offering pwn challenges related to system exploitation with different difficulty levels.

A comprehensive guide to investigating security incidents in popular cloud platforms, covering essential tools, logs, and techniques for cloud investigation and incident response.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

Copyright © 2025 - All rights reserved