Kraken is a simple cross-platform Yara scanner that can be built for Windows, Mac, FreeBSD and Linux. It is primarily intended for incident response, research and ad-hoc detections (not for endpoint protection). Following are the core features:
Some features are still under work or almost completed:
Screenshots
How to use?
Launch Kraken with any of the available options:
sage of kraken:
–backend string Specify a particular hostname to the backend to connect to (overrides the default)
–daemon Enable daemon mode (this will also enable the report flag)
–debug Enable debug logs
–folder string Specify a particular folder to be scanned (overrides the default full filesystem)
–no-autoruns Disable scanning of autoruns
–no-filesystem Disable scanning of filesystem
–no-process Disable scanning of running processes
–report Enable reporting of events to the backend
–rules Specify a particular path to a file or folder containing the Yara rules to use
User Guide
For details on how to install, use and build Kraken you should refer to the User Guide. The original source files for the documentation are available here, please open any issue or pull request pertinent to documentation there.
License
Kraken is released under the GNU General Public License v3.0 and is copyrighted to Claudio Guarnieri.
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…
MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…
"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…
CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…
The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…
The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…