capa Logo

capa

0
Free
Visit Website

Capa detects capabilities in executable files by analyzing PE, ELF, .NET modules, shellcode files, or sandbox reports to identify potential behaviors such as backdoors, service installation, or communication methods like HTTP. Check out our capa blog posts for more information: Dynamic capa: Exploring Executable Run-Time Behavior with the CAPE Sandbox, capa v4: casting a wider .NET (.NET support), ELFant in the Room – capa v3 (ELF support), capa 2.0: Better, Stronger, Faster, capa: Automatically Identify Malware Capabilities. Usage: $ capa.exe suspicious.exe. ATT&CK Tactic and Technique mapping available.

FEATURES

ALTERNATIVES

Copy executables with execute, but no read permission on Unix systems.

A collection of YARA rules for public use, built from intelligence profiles and file work.

A tool to locally check for signs of a rootkit with various checks and tests.

A collection of reverse engineering challenges covering a wide range of topics and difficulty levels.

Standalone graphical utility for viewing Java source codes from ".class" files.

PLASMA is an interactive disassembler with support for various architectures and formats, offering a Python API for scripting.

Malware sandbox for executing malicious files in an isolated environment with advanced features.

A Yara ruleset for detecting PHP shells and other webserver malware.