A semi-automatic handy tool to generate YARA rules from sample virus files ( WIP ) for Malware Analyst, inspired by the DIFF function of VirusTotal Premium Account.
You can find some sample virus files at https://github.com/YARA-Silly-Silly/sample-malwares
You can find the project repo at https://github.com/YARA-Silly-Silly/yarasilly2
The following are the rewards and benefits for contributors to this project.
If you are an active contributor we will add your image and Github handle in our Readme file.
This project will give a good understanding of the malware analysis world from the Blue Team perspective.
You can get to learn how YARA rules work and details regarding the rules.
Lear to use Python in the world of Threat Identification.
You don't have to be a coder to contribute to this project you can contribute by providing suggestions to improve the application or any other better way you want to involve in the project.
Want to provide suggestions? You can post it here - https://github.com/YARA-Silly-Silly/yarasilly2/issues/3
Are you a developer and want to try your hands dirty by adding new features to the application or make the existing code better? Check out the link - https://github.com/YARA-Silly-Silly/yarasilly2/blob/master/CONTRIBUTING.md
Yara Silly Silly is maintained by: