A semi-automatic handy tool to generate YARA rules from sample virus files (WIP) for Malware Analyst, inspired by DIFF function of VirusTotal Premium Account. Python3 is required. Clone the git repository and enter into the folder. Create and activate a virtual environment. Install ssdeep according to your OS. Check all the options that can be passed to the application using python yarasilly2.py --help. Config for the application is also present in the file config.ini in the root folder.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A tool that extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.
Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.
A static analysis tool for PE files that detects malicious behavior and provides information for manual analysis.
Joe Sandbox Community provides automated cloud-based malware analysis across multiple OS platforms.
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.