Yara Rule Generator

Yara Rule Generator

#Threat Defense#Threat Management

A library of event-based analytics written in EQL to detect adversary behaviors, now integrated into the Detection Engine of Kibana.

Visit Website

This tool is designed to streamline the creation of Yara rules

This tool is designed to simplify and accelerate the process of creating Yara rules that identify malware families and other malicious objects. It achieves this by analyzing samples of interest and prioritizing strings, emails, and headers, which leads to effective signature creation.

It is a Work in Progress

This project is currently a work in progress, and we welcome your feedback and contributions. For the web application version, please visit http://yaragenerator.com.