YARA Silly Silly

YARA Silly Silly

#Security Testing#Malware Analysis

A collection of Yara rules for detecting malware evasion techniques

Visit Website

A Semi-Automatic Tool for Generating YARA Rules

This semi-automatic tool is designed to generate YARA rules from sample virus files (work in progress) for Malware Analysts. It is inspired by the DIFF function available in a VirusTotal Premium Account. To use this tool, Python3 is required. Start by cloning the Git repository and navigate into the folder. Next, create and activate a virtual environment. Depending on your operating system, install ssdeep. You can view all the options available for the application by running python yarasilly2.py --help. Additionally, configuration settings for the application can be found in the config.ini file located in the root folder.