arya
Malware simulator
A tool that generates custom-made files to trigger YARA rules and mimic malware behavior.
Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.
242 stars
12 watching
22 forks
Language: Python
last commit: about 2 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
| Automatically generates YARA rules from sample files for malware analysis | 28 |
| Tool to create and match patterns for identifying malware samples | 8,370 |
| A tool for identifying and classifying malware samples based on textual or binary patterns | 7 |
| A Python interface to use YARA's features from Python programs | 665 |
| A .Net wrapper library for the native Yara library to quickly identify and classify malware samples. | 38 |
| A tool used to scan files and assets for malware using Yara signatures, offering incident response capabilities. | 104 |
| Scans S3 buckets for malware using ClamAV and Yara signatures in real-time | 32 |
| Automates the creation of Yara rules to detect malware and other malicious objects of interest by analyzing sample files from various sources. | 332 |
| A curated collection of YARA rules for identifying and flagging malicious code and behavior. | 60 |
| A web service for scanning files with Yara rules to detect malware and other threats | 27 |
| A collection of educational scripts and payloads for simulating vulnerabilities and malware attacks on Windows systems using custom hardware. | 60 |
| A collection of YARA rules for malware analysis and threat intelligence | 10 |
| A repository of pre-defined YARA rules for detecting malware and other malicious software | 126 |
| A collection of YARA rules for detecting malware and suspicious activity in various environments. | 11 |
| A tool for decompressing malware samples and running Yara rules against them. | 7 |