CAPEv2
Malware analyzer
A tool to extract configuration and payload from malware by analyzing its behavior in a sandboxed environment.
Malware Configuration And Payload Extraction
2k stars
64 watching
430 forks
Language: Python
last commit: 2 months ago
Linked from 2 awesome lists
capeconfigsdebugging-toolsmalwaremalware-analysismalware-researchreverse-engineeringsandboxunpacking
Related projects:
Repository | Description | Stars |
---|---|---|
| An all-in-one malware analysis tool that provides detailed information about suspicious files and executables. | 1,348 |
| An executable file analysis tool that identifies capabilities and potential malicious behaviors. | 4,944 |
| A tool for automatically analyzing malware behavior and identifying patterns and classes. | 369 |
| Sandbox for analyzing and understanding JavaScript malware | 465 |
| A command-line tool for analyzing malware and disassembling binary files | 386 |
| A platform for analyzing malware and performing reverse engineering on binary files | 424 |
| An analysis repository providing scripts, signatures, and IOCs for detecting and analyzing malware. | 110 |
| An environment for building secure and isolated test automation frameworks for analyzing and testing malware | 816 |
| Analyzes malware files to detect suspicious behavior by extracting meta information and features. | 1 |
| Automated malware analysis tool | 118 |
| Analyzes malware by extracting and comparing system call dependencies to classify and detect malicious behavior | 101 |
| A collection of reusable scripts and tools for analyzing malicious software | 75 |
| An interactive exploration of various malware analysis techniques using Python and Jupyter Notebook | 195 |
| An analysis tool that reveals anti-debugging and anti-VM techniques used by malware samples. | 735 |
| Tool to analyze files during malware analysis and triage by extracting properties and detecting malicious indicators. | 77 |