CAPE Logo

CAPE

0
Free
Visit Website

CAPE is a malware sandbox used to execute malicious files in an isolated environment, instrument their dynamic behavior, and collect forensic artifacts. It features behavioral instrumentation, file capture, network traffic capture, malware classification, screenshots, memory dumps, automated unpacking, YARA signature-based classification, configuration extraction, debugger automation, anti-sandbox countermeasures, instruction traces, and an interactive desktop. A free demonstration instance is available online for anyone to use.

FEATURES

ALTERNATIVES

Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.

ILSpy is the open-source .NET assembly browser and decompiler with various decompiler frontends and features.

A command-line program for finding secrets and sensitive information in textual data and Git history.

A tool that generates Yara rules for strings and their XOR encoded versions, as well as base64-encoded variations with different padding possibilities.

YaraHunter scans container images, running Docker containers, and filesystems to find indicators of malware.

A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.

A sandbox for quickly sandboxing known or unknown families of Android Malware

Online Java decompiler tool with support for modern Java features.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved