CAPEv2
Malware analyzer
A tool to extract configuration and payload from malware by analyzing its behavior in a sandboxed environment.
Malware Configuration And Payload Extraction
2k stars
64 watching
430 forks
Language: Python
last commit: 11 months ago
Linked from 2 awesome lists
capeconfigsdebugging-toolsmalwaremalware-analysismalware-researchreverse-engineeringsandboxunpacking
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | An all-in-one malware analysis tool that provides detailed information about suspicious files and executables. | 1,348 |
| | An executable file analysis tool that identifies capabilities and potential malicious behaviors. | 4,944 |
| | A tool for automatically analyzing malware behavior and identifying patterns and classes. | 369 |
| | Sandbox for analyzing and understanding JavaScript malware | 465 |
| | A command-line tool for analyzing malware and disassembling binary files | 386 |
| | A platform for analyzing malware and performing reverse engineering on binary files | 424 |
| | An analysis repository providing scripts, signatures, and IOCs for detecting and analyzing malware. | 110 |
| | An environment for building secure and isolated test automation frameworks for analyzing and testing malware | 816 |
| | Analyzes malware files to detect suspicious behavior by extracting meta information and features. | 1 |
| | Automated malware analysis tool | 118 |
| | Analyzes malware by extracting and comparing system call dependencies to classify and detect malicious behavior | 101 |
| | A collection of reusable scripts and tools for analyzing malicious software | 75 |
| | An interactive exploration of various malware analysis techniques using Python and Jupyter Notebook | 195 |
| | An analysis tool that reveals anti-debugging and anti-VM techniques used by malware samples. | 735 |
| | Tool to analyze files during malware analysis and triage by extracting properties and detecting malicious indicators. | 77 |