KLara project is aimed at helping Threat Intelligence researchers hunt for new malware using Yara. In order to hunt efficiently for malware, one needs a large collection of samples to search over. Researchers usually need to fire a Yara rule over a collection / set of malicious files and then get the results back. In some cases, the rule needs adjusting. Unfortunately, scanning a large collection of files takes time. Instead, if a custom architecture is used, scanning 10TB of files can take around 30 minutes. KLara, a distributed system written in Python, allows researchers to scan one or more Yara rules over collections with samples, getting notifications by e-mail as well as the web interface when scan results are ready. Features Modern web interface, allowing researchers to 'fire and forget' their rules, getting back results by e-mail / API Powerful API, allowing for automatic Yara jobs submissions, checking their status and getting back results. API Documentation will be released soon. Distributed system, running on commodity hardware, easy to deploy and implement. Architecture KLara leverages Yara's power, distributing scans using a dispatcher-worker mode.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Joe Sandbox Community provides automated cloud-based malware analysis across multiple OS platforms.
CAPA is a static analysis tool that detects and reports capabilities in executable files across multiple formats, mapping findings to MITRE ATT&CK tactics and techniques.
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
A tool that extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.
A static analysis tool for PE files that identifies potential malicious indicators through compiler detection, packing analysis, signature matching, and suspicious string identification.
Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.
Code to prevent a managed .NET debugger/profiler from working.
A program to manage yara ruleset in a database with support for different databases and configuration options.
A collaborative malware analysis framework with various features for automated analysis tasks.