KLara Logo

KLara

0
Free
Visit Website

KLara project is aimed at helping Threat Intelligence researchers hunt for new malware using Yara. In order to hunt efficiently for malware, one needs a large collection of samples to search over. Researchers usually need to fire a Yara rule over a collection / set of malicious files and then get the results back. In some cases, the rule needs adjusting. Unfortunately, scanning a large collection of files takes time. Instead, if a custom architecture is used, scanning 10TB of files can take around 30 minutes. KLara, a distributed system written in Python, allows researchers to scan one or more Yara rules over collections with samples, getting notifications by e-mail as well as the web interface when scan results are ready. Features Modern web interface, allowing researchers to 'fire and forget' their rules, getting back results by e-mail / API Powerful API, allowing for automatic Yara jobs submissions, checking their status and getting back results. API Documentation will be released soon. Distributed system, running on commodity hardware, easy to deploy and implement. Architecture KLara leverages Yara's power, distributing scans using a dispatcher-worker mode.

FEATURES

ALTERNATIVES

A serverless, real-time, and retroactive malware detection tool that scans files with YARA rules and alerts incident response teams.

A tool to embed XXE and XSS payloads in various file formats

A tool for malware analysts to search through base64-encoded samples and generate yara rules.

Automate the process of writing YARA rules based on executable code within malware.

Assembler/disassembler for the dex format used by Dalvik, Android's Java VM implementation.

ICSREF is a modular framework for automated reverse engineering of industrial control systems binaries

Yara mode for GNU Emacs to edit Yara related files

OCyara performs OCR on image files and scans them for matches to Yara rules, supporting Debian-based Linux distros.

PINNED