β οΈ Warning: By now this is an experimental, in-progress version of Amaru Antivirus. It is currently under active development and should not be used in production environments. Features may be incomplete, unstable or subject to significant changes. Use at your own risk.
Origin: Mythological Inca serpent that guards treasures.
Analogy: Coils around and neutralizes threats.
Open-source antivirus for Windows 11 with real-time scanning, YARA rules, Radare2 integration, and Rust-powered efficiency.
Amaru is a community-driven fork of ClamWin, supercharged with modern malware detection capabilities:
- Real-time protection via Rust-native file monitoring
- Heuristic analysis using YARA rules and Radare2 static analysis
- Low resource consumption thanks to Rust-optimized modules
- Modern UI built with Tauri + Svelte + TailwindCSS
Designed for users who value transparency, customization, and Windows 11 compatibility.
Feature | Technology | Description |
---|---|---|
Real-Time File Monitoring | notify-rs + ClamAV |
Watches file changes and scans instantly |
YARA Rule Engine | YARA 4.3+ | Detects malware patterns with custom/signed rules |
Static Analysis | Radare2 | Examines PE headers, sections, and suspicious strings |
Low-Level Performance | Rust | Memory-safe modules for scanning and hooks |
Windows 11 Integration | WinAPI + WFP | Native kernel-level file filtering |
Modern UI | Tauri + Svelte | Responsive and efficient user interface |
- Windows 11 (64-bit)
- 4GB RAM
- 1GB free disk space
- Admin privileges for real-time protection
- Windows 11 (64-bit, version 22H2 or later)
- 8GB RAM
- 2GB free disk space
- SSD storage
- Admin privileges
- Rust toolchain (1.70 or later)
- Node.js 18 or later (for UI development)
- Visual Studio Build Tools with C++ workload
- Git for Windows
- Download the latest release from the Releases page.
- Run the installer with administrator privileges.
- Follow the on-screen instructions to complete the installation.
- Install the required dependencies (YARA 4.3+ and Radare2).
- Download the pre-built binary package.
- Extract to your desired location.
- Run
amaru-setup.exe
to configure the service components.
-
Install Rust:
winget install Rustlang.Rust.MSVC rustup toolchain install nightly rustup default nightly
-
Install Dependencies:
# Install Radare2 winget install radare.radare2 # Install YARA (4.3+) # Download from https://github.com/VirusTotal/yara/releases # For UI development winget install OpenJS.NodeJS.LTS
-
Clone and Build:
git clone https://github.com/CripterHack/Amaru.git cd Amaru # Build backend cargo build --release # Build GUI cd gui npm install npm run build # Build complete package cd .. cargo run --bin amaru-packager
-
Configure:
copy .env.example .env # Edit .env with your settings
-
Run Examples:
# Run the EICAR test file detection example cargo run --example eicar_detection # Run other examples cargo run --example use_core_services
The most user-friendly way to interact with Amaru is through its graphical interface:
- Launch Amaru from the Start menu or desktop shortcut.
- Use the dashboard to view protection status and recent events.
- Schedule scans and configure protection settings through the Settings page.
Amaru provides a powerful command-line interface for advanced users and automation:
# Scan a specific file
amaru scan --path C:\path\to\file.exe
# Scan a directory recursively
amaru scan --path C:\Users\Documents --recursive
# Enable real-time protection
amaru monitor --action start
# Update YARA rules
amaru update --rules
# Analyze a suspicious file with detailed reporting
amaru analyze --file C:\suspicious\file.exe --radare2 --heuristic
# Test detection capabilities with EICAR test file
amaru test-eicar
# Check service status
amaru service --action status
Amaru runs as a Windows service for real-time protection:
# Install the service (admin privileges required)
amaru service --action install
# Start the service
amaru service --action start
# Stop the service
amaru service --action stop
# Check service status
amaru service --action status
Configure scheduled scans with the built-in scheduler:
# Schedule a daily scan at 3 AM
amaru schedule --daily --time "03:00" --path "C:\Users"
# Schedule a weekly scan on Sundays
amaru schedule --weekly --day Sunday --time "02:00" --path "C:\"
- File System Monitoring: Detects and scans files as they're created or modified
- Process Behavior Analysis: Monitors process activities for suspicious behavior
- Network Traffic Inspection: Integrates with Windows Filtering Platform
- Executable Analysis: Deep inspection of PE files before execution
- Signature-Based Detection: Using YARA rules and ClamAV databases
- Heuristic Analysis: Detects suspicious patterns and behaviors
- Memory Scanning: Examines process memory for hidden threats
- Static Analysis: Uses Radare2 to analyze executable structure and behavior
- EICAR Test Detection: Recognizes the EICAR test file for antivirus validation
- Quarantine System: Safely isolates detected threats
- Behavioral Blocking: Prevents suspicious activities in real-time
- Reputation Checking: Verifies file reputation against known safe files
- Rootkit Detection: Identifies hidden and privileged malware
amaru/
βββ src/ # Core Rust implementation
βββ gui/ # Tauri + Svelte frontend
βββ yara-engine/ # YARA integration
βββ radare2-analyzer/ # Static analysis tools
βββ realtime-monitor/ # File system monitor
βββ updater/ # Update system
βββ signatures/ # YARA rules
βββ installer/ # Windows installer
βββ docs/ # Documentation
# Install dev tools
cargo install cargo-watch cargo-audit
# Run tests
cargo test --all
# Development mode
cd gui
npm run dev
# Build release version
cargo build --release
# Build installer
cargo run --bin amaru-installer-builder
# Run tests
cargo test --all
# Build documentation
cargo doc --open
# Run unit tests
cargo test
# Run integration tests
cargo test --test '*'
# Run specific test
cargo test --test scan_test
# Enable debug logging
$env:RUST_LOG="debug,amaru=trace"
cargo run
# Run with performance profiling
cargo run --features profile_allocation
This project is licensed under the GNU General Public License v2.0 - see the LICENSE file for details.
- ClamWin - Original project
- YARA - Pattern matching engine
- Radare2 - Reverse engineering framework
- Tauri - GUI framework
- Svelte - UI library
- TailwindCSS - Styling system
- Open an issue for bug reports or feature requests
Contributions are welcome! Please check the CONTRIBUTING.md file for guidelines.
Disclaimer: Amaru is a community project and is not affiliated with or endorsed by ClamAV or Cisco Talos.