CAPE Logo

CAPE

0
Free
Visit Website

CAPE is a malware sandbox used to execute malicious files in an isolated environment, instrument their dynamic behavior, and collect forensic artifacts. It features behavioral instrumentation, file capture, network traffic capture, malware classification, screenshots, memory dumps, automated unpacking, YARA signature-based classification, configuration extraction, debugger automation, anti-sandbox countermeasures, instruction traces, and an interactive desktop. A free demonstration instance is available online for anyone to use.

FEATURES

ALTERNATIVES

A tool for identifying sensitive secrets in public GitHub repositories

Interactive malware hunting service with live access to the heart of an incident.

Educational resources for reverse engineering tutorials by lena151.

A strings statistics calculator for YARA rules to aid malware research.

FLARE Obfuscated String Solver (FLOSS) automatically extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.

A Python script for scanning data within an IDB using Yara

A tool for hacking and security testing of JWT

Binwalk is a tool for analyzing, reverse engineering, and extracting firmware images with security and Python 2.7 deprecation notices.