YARA Silly Silly Logo

YARA Silly Silly

0
Free
Visit Website

A semi-automatic handy tool to generate YARA rules from sample virus files (WIP) for Malware Analyst, inspired by DIFF function of VirusTotal Premium Account. Python3 is required. Clone the git repository and enter into the folder. Create and activate a virtual environment. Install ssdeep according to your OS. Check all the options that can be passed to the application using python yarasilly2.py --help. Config for the application is also present in the file config.ini in the root folder.

FEATURES

ALTERNATIVES

One stop shop for decompiling Android apps with a focus on regenerating R references.

A sandbox for quickly sandboxing known or unknown families of Android Malware

A multithreaded YARA scanner for incident response or malware zoos.

A minimal library to generate YARA rules from JAVA with maven support.

Fuzzilli is a JavaScript engine fuzzer that helps identify vulnerabilities in JavaScript engines.

A command-line tool for identifying NoSQL injection vulnerabilities in MongoDB databases

A backend agnostic debugger frontend for debugging binaries without source code access.

A tool to find XSS vulnerabilities in web applications

PINNED