KLara Logo

KLara

0
Free
Visit Website

KLara project is aimed at helping Threat Intelligence researchers hunt for new malware using Yara. In order to hunt efficiently for malware, one needs a large collection of samples to search over. Researchers usually need to fire a Yara rule over a collection / set of malicious files and then get the results back. In some cases, the rule needs adjusting. Unfortunately, scanning a large collection of files takes time. Instead, if a custom architecture is used, scanning 10TB of files can take around 30 minutes. KLara, a distributed system written in Python, allows researchers to scan one or more Yara rules over collections with samples, getting notifications by e-mail as well as the web interface when scan results are ready. Features Modern web interface, allowing researchers to 'fire and forget' their rules, getting back results by e-mail / API Powerful API, allowing for automatic Yara jobs submissions, checking their status and getting back results. API Documentation will be released soon. Distributed system, running on commodity hardware, easy to deploy and implement. Architecture KLara leverages Yara's power, distributing scans using a dispatcher-worker mode.

FEATURES

ALTERNATIVES

A free web-based Yara debugger for security analysts to write hunting or detection rules with ease.

A yara module for searching strings inside zip files

Generate Yara rules from function basic blocks in x64dbg.

A powerful tool for detecting and identifying malware using a rule-based system.

A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.

A command-line program for finding secrets and sensitive information in textual data and Git history.

An online hash checker utility that retrieves information from various online sources, including Virustotal, HybridAnalysis, and more.

Copy executables with execute, but no read permission on Unix systems.

PINNED

ImmuniWeb® Discovery Logo

ImmuniWeb® Discovery

ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Attack Surface Management
InfoSecHired Logo

InfoSecHired

An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Resources
Mandos Brief Newsletter Logo

Mandos Brief Newsletter

A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Resources
Checkmarx SCA Logo

Checkmarx SCA

A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Application Security
Check Point CloudGuard WAF Logo

Check Point CloudGuard WAF

A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Application Security
Orca Security Logo

Orca Security

A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

Cloud Security
DryRun Logo

DryRun

A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Application Security
Wiz Logo

Wiz

Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Cloud Security