yarGen Logo

yarGen

0
Free
Updated 11 March 2025
Visit Website

yarGen is a generator for YARA rules. The main principle is the creation of yara rules from strings found in malware files while removing all strings that also appear in goodware files. yarGen includes a big goodware strings and opcode database as ZIP archives that have to be extracted before the first use. In version 0.24.0, yarGen introduces an output option (--ai). This feature generates a YARA rule with an expanded set of strings and includes instructions tailored for an AI. Activating the --ai flag appends the instruction text to the yargen_rules.yar output file, which can subsequently be fed into your AI for processing. With version 0.23.0 yarGen has been ported to Python3. If you'd like to use a version using Python 2, try a previous release. (Note that the download location for the pre-built databases has changed)

FEATURES

EXPLORE BY TAGS

SIMILAR TOOLS

A tool for searching a Git repository for interesting content

A deserialization payload generator for .NET formatters

A Python library to interface with a cuckoo-modified instance.

Collects Yara rules from over 150 free resources, a free alternative to Valhalla.

Interactive .NET SQL console client with enhanced SQL Server discovery, access, and data exfiltration features

A tool for processing compiled YARA rules in IDA.

A tool for deep analysis of malicious files using ClamAV and YARA rules, with features like scoring suspect files, building visual tree graphs, and extracting specific patterns.

OCaml wrapper for YARA matching engine for malware identification

Fernflower is an analytical decompiler for Java with command-line options and support for external classes.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

Copyright © 2025 - All rights reserved