arya

Malware simulator

A tool that generates custom-made files to trigger YARA rules and mimic malware behavior.

Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.

GitHub

240 stars
12 watching
22 forks
Language: Python
last commit: almost 2 years ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
yara-silly-silly/yarasilly2 Automatically generates YARA rules from sample files for malware analysis 28
virustotal/yara A tool for creating pattern matching rules to identify and classify malware samples 8,335
justicerage/yara A tool for identifying and classifying malware samples based on textual or binary patterns 7
virustotal/yara-python A Python interface to use YARA's features from Python programs 661
airbus-cert/dnyara A .Net wrapper library for the native Yara library to quickly identify and classify malware samples. 38
yara-rules/yara-endpoint A tool used to scan files and assets for malware using Yara signatures, offering incident response capabilities. 104
abhinavbom/clara Scans S3 buckets for malware using ClamAV and Yara signatures in real-time 32
xen0ph0n/yaragenerator Automates the creation of Yara rules to detect malware and other malicious objects of interest by analyzing sample files from various sources. 332
tenable/yara-rules A curated collection of YARA rules for identifying and flagging malicious code and behavior. 60
jheise/yarascanner A web service for scanning files with Yara rules to detect malware and other threats 27
markcyber/badusb A collection of educational scripts and payloads for simulating vulnerabilities and malware attacks on Windows systems using custom hardware. 54
f0wl/yara_rules A collection of YARA rules for malware analysis and threat intelligence 10
intezer/yara-rules A repository of pre-defined YARA rules for detecting malware and other malicious software 125
securitymagic/yara A collection of YARA rules for detecting malware and suspicious activity in various environments. 11
rjzak/decompressingyara A tool for decompressing malware samples and running Yara rules against them. 7