YARA Silly Silly Logo

YARA Silly Silly

0
Free
Updated 11 March 2025
Visit Website

A semi-automatic handy tool to generate YARA rules from sample virus files (WIP) for Malware Analyst, inspired by DIFF function of VirusTotal Premium Account. Python3 is required. Clone the git repository and enter into the folder. Create and activate a virtual environment. Install ssdeep according to your OS. Check all the options that can be passed to the application using python yarasilly2.py --help. Config for the application is also present in the file config.ini in the root folder.

FEATURES

SIMILAR TOOLS

A Burp intruder extender for automating and validating XSS vulnerabilities

Define and validate YARA rule metadata with CCCS YARA Specification.

A web-based manager for Yara rules, allowing for storage, editing, and management of Yara rules.

A tool for identifying and analyzing Java serialized objects in network traffic

Microservice for scanning files with Yara

A simple JWT token brute force cracker

A PowerShell obfuscation detection framework designed to highlight the limitations of signature-based detection and provide a scalable means of detecting known and unknown obfuscation techniques.

A malware processing and analytics tool that utilizes Pig, Django, and Elasticsearch to analyze and visualize malware data.

Python wrapper for Android APK decompilation with various converter and decompiler options.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved