A semi-automatic handy tool to generate YARA rules from sample virus files (WIP) for Malware Analyst, inspired by DIFF function of VirusTotal Premium Account. Python3 is required. Clone the git repository and enter into the folder. Create and activate a virtual environment. Install ssdeep according to your OS. Check all the options that can be passed to the application using python yarasilly2.py --help. Config for the application is also present in the file config.ini in the root folder.
Common questions about YARA Silly Silly including features, pricing, alternatives, and user reviews.
YARA Silly Silly is A semi-automatic tool to generate YARA rules from virus samples. It is a Security Operations solution designed to help security teams with YARA.
YARA Silly Silly is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/YARA-Silly-Silly/yarasilly2/ for download and installation instructions.
Popular alternatives to YARA Silly Silly include:
Compare these tools and more at https://cybersectools.com/categories/security-operations
YARA Silly Silly is for security teams and organizations that need YARA. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Malware scanning tool for DFIR using 40+ engines from ReversingLabs
Malware analysis platform for SOC teams with binary analysis and threat detection