CAPE Logo

CAPE

0
Free
Visit Website

CAPE is a malware sandbox used to execute malicious files in an isolated environment, instrument their dynamic behavior, and collect forensic artifacts. It features behavioral instrumentation, file capture, network traffic capture, malware classification, screenshots, memory dumps, automated unpacking, YARA signature-based classification, configuration extraction, debugger automation, anti-sandbox countermeasures, instruction traces, and an interactive desktop. A free demonstration instance is available online for anyone to use.

FEATURES

ALTERNATIVES

A PE/COFF file viewer that displays header, section, directory, import table, export table, and resource information within various file types.

Redexer is a reengineering tool for Android app binaries with features like RefineDroid and Dr. Android.

Code to prevent a managed .NET debugger/profiler from working.

A tool for injecting and loading executables with a focus on stealth techniques.

A Python script for scanning data within an IDB using Yara

A .NET wrapper for libyara that provides a simplified API for developing tools in C# and PowerShell.

RABCDAsm is a collection of utilities for ActionScript 3 assembly/disassembly and SWF file manipulation.

BARF is an open source binary analysis framework for supporting various binary code analysis tasks in information security.

PINNED