Yara Rule Generator Logo

Yara Rule Generator

0
Free
Visit Website

This tool is designed to simplify and speed up the process of creating Yara rules to identify malware families and other malicious objects by analyzing samples of interest and prioritizing strings/emails/headers for effective signature creation. It is a work in progress, welcoming feedback and contributions. Visit http://yaragenerator.com for the web application version.

FEATURES

ALTERNATIVES

eCrimeLabs provides a SOAR platform for threat detection and response, integrated with MISP.

A daily collection of IOCs from various sources, including articles and tweets.

A threat hunting tool for Windows event logs to detect APT movements and decrease the time to uncover suspicious activity.

Python-based client for IBM XForce Exchange with an improved version available.

A collection of YARA rules for research and hunting purposes.

Repository of APT-related documents and notes sorted by year.

Packet Storm is a global security resource providing around-the-clock information and tools to mitigate personal data and fiscal loss on a global scale.

A modular malware collection and processing framework with support for various threat intelligence feeds.