Visit Website

This tool is designed to simplify and speed up the process of creating Yara rules to identify malware families and other malicious objects by analyzing samples of interest and prioritizing strings/emails/headers for effective signature creation. It is a work in progress, welcoming feedback and contributions. Visit http://yaragenerator.com for the web application version.

FEATURES

ALTERNATIVES

VirusTotal API v3 is a threat intelligence platform for scanning files, URLs, and IP addresses, and retrieving reports on threat reputation and context.

Acapulco is a Splunk application that automatically generates meta-events from hpfeeds channels and visualizes them using D3.js.

DNSDumpster is a domain research tool for discovering and analyzing DNS records to map an organization's attack surface.

A tool for navigating and annotating ATT&CK matrices with the ability to define custom layers for specific views.

A framework for managing cyber threat intelligence in structured formats.

A comprehensive and unrestricted dataset of security incidents for research and decision-making

A list of most queried domains based on passive DNS usage across the Umbrella global network.

A library of event-based analytics written in EQL to detect adversary behaviors, now integrated into the Detection Engine of Kibana.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved