CAPE Logo

CAPE

0
Free
Updated 11 March 2025
Visit Website

CAPE is a malware sandbox used to execute malicious files in an isolated environment, instrument their dynamic behavior, and collect forensic artifacts. It features behavioral instrumentation, file capture, network traffic capture, malware classification, screenshots, memory dumps, automated unpacking, YARA signature-based classification, configuration extraction, debugger automation, anti-sandbox countermeasures, instruction traces, and an interactive desktop. A free demonstration instance is available online for anyone to use.

FEATURES

SIMILAR TOOLS

Hyara is a plugin that simplifies writing YARA rules with various convenient features.

A debugger tool for reverse engineers, crackers, and security analysts, with a user-friendly debugging UI and custom agent support.

Identifies 137 malicious npm packages and gathers system information to a remote server.

An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.

A Burp plugin for identifying potential vulnerabilities in web applications

A tool for testing and exploiting Cross-Site Scripting (XSS) vulnerabilities.

A freeware suite of tools for PE editing and process viewing, including CFF Explorer and Resource Editor.

Generate Yara rules from function basic blocks in x64dbg.

Binary Ninja is an interactive decompiler, disassembler, debugger, and binary analysis platform with a focus on automation and a clean GUI.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

Copyright © 2025 - All rights reserved