yarAnalyzer Logo

yarAnalyzer

0
Free
Visit Website

yarAnalyzer creates statistics on a yara rule set and files in a sample directory. Place some signatures with .yar extension in the 'signatures' folder and then run yarAnalyzer on a certain sample directory like: yarAnalyzer.py -p /sample/path -s /signatures. It will generate two tables as command line output and two CSV files (yaranalyzer_file_stats.csv, yaranalyzer_rule_stats.csv). A new feature is the inventory creation. yarAnalyzer.py --inventory -s /signatures. This will create a CSV file named yara-rule-inventory.csv (default, set with '-o') with information about the initialized rules (Rule File;Rule Name;Description;Reference). Screenshots, Rule Statistics, File Statistics, CSV Output in Excel.

FEATURES

ALTERNATIVES

Deception based detection techniques with MITRE ATT&CK mapping and Honey Resources.

Parse IOCs from text

Collect various intelligence sources for hosts in CSV format.

A modular tool for collecting intelligence sources for files and outputting in CSV format.

A cybersecurity tool with online demo, mailing list, and multiple installation methods.

IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol, with a focus on incident handling automation and threat intelligence processing.

RedEye is a visual analytic tool for enhancing Red and Blue Team operations.

Repository with projects for photo and video hashing, content moderation, and signal exchange.