KLara project is aimed at helping Threat Intelligence researchers hunt for new malware using Yara. In order to hunt efficiently for malware, one needs a large collection of samples to search over. Researchers usually need to fire a Yara rule over a collection / set of malicious files and then get the results back. In some cases, the rule needs adjusting. Unfortunately, scanning a large collection of files takes time. Instead, if a custom architecture is used, scanning 10TB of files can take around 30 minutes. KLara, a distributed system written in Python, allows researchers to scan one or more Yara rules over collections with samples, getting notifications by e-mail as well as the web interface when scan results are ready. Features Modern web interface, allowing researchers to 'fire and forget' their rules, getting back results by e-mail / API Powerful API, allowing for automatic Yara jobs submissions, checking their status and getting back results. API Documentation will be released soon. Distributed system, running on commodity hardware, easy to deploy and implement. Architecture KLara leverages Yara's power, distributing scans using a dispatcher-worker mode.
Common questions about KLara including features, pricing, alternatives, and user reviews.
KLara is KLara is a distributed system written in Python that helps Threat Intelligence researchers hunt for new malware using Yara. It is a Security Operations solution designed to help security teams with YARA, Cyber Threat Intelligence.
KLara is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/KasperskyLab/klara/ for download and installation instructions.
Popular alternatives to KLara include:
Compare all KLara alternatives at https://cybersectools.com/alternatives/klara
KLara is for security teams and organizations that need YARA, Cyber Threat Intelligence. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Head-to-head feature, pricing, and rating breakdowns.
Managed Agentic Threat Hunting Service (IOC sweeps and hypothesis based hunting)
Expands a single malware hash into full family visibility via structural analysis.
Define and validate YARA rule metadata with CCCS YARA Specification.