CAPE Logo

CAPE

0
Free
Visit Website

CAPE is a malware sandbox used to execute malicious files in an isolated environment, instrument their dynamic behavior, and collect forensic artifacts. It features behavioral instrumentation, file capture, network traffic capture, malware classification, screenshots, memory dumps, automated unpacking, YARA signature-based classification, configuration extraction, debugger automation, anti-sandbox countermeasures, instruction traces, and an interactive desktop. A free demonstration instance is available online for anyone to use.

FEATURES

ALTERNATIVES

A disassembly framework with support for multiple hardware architectures and clean API.

YARA rules for ProcFilter to detect malware and threats

YaraHunter scans container images, running Docker containers, and filesystems to find indicators of malware.

Java code implementing the AutoYara algorithm for automatic Yara rule generation from input samples.

Identifies 137 malicious npm packages and gathers system information to a remote server.

Andromeda makes reverse engineering of Android applications faster and easier.

A tool for testing and exploiting Cross-Site Scripting (XSS) vulnerabilities.

A Django web interface for managing Yara rules with features like search, categorization, and bulk edits.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved