A semi-automatic handy tool to generate YARA rules from sample virus files (WIP) for Malware Analyst, inspired by DIFF function of VirusTotal Premium Account. Python3 is required. Clone the git repository and enter into the folder. Create and activate a virtual environment. Install ssdeep according to your OS. Check all the options that can be passed to the application using python yarasilly2.py --help. Config for the application is also present in the file config.ini in the root folder.
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
A Burp intruder extender for automating and validating XSS vulnerabilities
Collection of malware persistence information and techniques
A collection of resources for beginners to learn assembly language.
Tool for decompressing malware samples to run Yara rules against them.
A dataset release policy for the Android Malware Genome Project, requiring authentication and justification for access to the dataset.
Malware sandbox for executing malicious files in an isolated environment with advanced features.