capa Logo

capa

0
Free
Updated 11 March 2025
Visit Website

Capa detects capabilities in executable files by analyzing PE, ELF, .NET modules, shellcode files, or sandbox reports to identify potential behaviors such as backdoors, service installation, or communication methods like HTTP. Check out our capa blog posts for more information: Dynamic capa: Exploring Executable Run-Time Behavior with the CAPE Sandbox, capa v4: casting a wider .NET (.NET support), ELFant in the Room – capa v3 (ELF support), capa 2.0: Better, Stronger, Faster, capa: Automatically Identify Malware Capabilities. Usage: $ capa.exe suspicious.exe. ATT&CK Tactic and Technique mapping available.

FEATURES

SIMILAR TOOLS

A tool designed to handle archive file data and augment Yara's capabilities.

Explores malware interaction with Windows API and methods for detection and prevention.

A payload creation framework for the retrieval and execution of arbitrary CSharp source code.

An online hash checker utility that retrieves information from various online sources, including Virustotal, HybridAnalysis, and more.

Original SmaliHook Java source for Android cracking and reversing.

A tool for malware analysts to search through base64-encoded samples and generate yara rules.

Automated Android Malware Analysis tool

A comprehensive guide to malware analysis and reverse engineering, covering topics such as lab setup, debugging, and anti-debugging.

dynStruct is a tool for monitoring memory accesses of an ELF binary and recovering structures of the original code.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved