YARA Silly Silly Logo

YARA Silly Silly

0
Free
Visit Website

A semi-automatic handy tool to generate YARA rules from sample virus files (WIP) for Malware Analyst, inspired by DIFF function of VirusTotal Premium Account. Python3 is required. Clone the git repository and enter into the folder. Create and activate a virtual environment. Install ssdeep according to your OS. Check all the options that can be passed to the application using python yarasilly2.py --help. Config for the application is also present in the file config.ini in the root folder.

FEATURES

ALTERNATIVES

A simple XSS scanner tool for identifying Cross-Site Scripting vulnerabilities

A project providing open-source YARA rules for malware and malicious file detection

Automate the exploitation of XXE vulnerabilities

Krakatau provides an assembler and disassembler for Java bytecode, supporting conversion, creation, examination, comparison, and decompilation of Java binaries.

RABCDAsm is a collection of utilities for ActionScript 3 assembly/disassembly and SWF file manipulation.

PinCTF is a tool for using Intel's Pin Tool to instrument reverse engineering binaries and count instructions.

PLASMA is an interactive disassembler with support for various architectures and formats, offering a Python API for scripting.

A simple JWT token brute force cracker

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved