CAPE Logo

CAPE

0
Free
Visit Website

CAPE is a malware sandbox used to execute malicious files in an isolated environment, instrument their dynamic behavior, and collect forensic artifacts. It features behavioral instrumentation, file capture, network traffic capture, malware classification, screenshots, memory dumps, automated unpacking, YARA signature-based classification, configuration extraction, debugger automation, anti-sandbox countermeasures, instruction traces, and an interactive desktop. A free demonstration instance is available online for anyone to use.

FEATURES

ALTERNATIVES

Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.

A PowerShell module for interacting with VirusTotal to analyze suspicious files and URLs.

A framework for creating XNU based rootkits for OS X and iOS security research

A tool for translating Dalvik bytecode to Java bytecode for analyzing Android applications.

Scans running processes for potentially malicious implants and dumps them.

A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence

A collection of XSS payloads designed to turn alert(1) into P1

One stop shop for decompiling Android apps with a focus on regenerating R references.