Dorothy2 is a malware/botnet analysis framework written in Ruby. It offers a very flexible modular environment for suspicious binary analysis, interactive investigation framework with a focus on network analysis, and the ability to recognize new spawned processes by comparing them with a baseline. It also utilizes pre-configured analysis profiles for detailed analysis.
Common questions about Dorothy2 including features, pricing, alternatives, and user reviews.
Dorothy2 is A malware/botnet analysis framework with a focus on network analysis and process comparison. It is a Security Operations solution designed to help security teams with Binary Analysis, Botnet.
Dorothy2 is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/m4rco-/dorothy2/ for download and installation instructions.
Popular alternatives to Dorothy2 include:
Compare these tools and more at https://cybersectools.com/categories/security-operations
Dorothy2 is for security teams and organizations that need Binary Analysis, Botnet. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Malware analysis platform for SOC teams with binary analysis and threat detection
Agentic AI tool for automated malware reverse engineering & phishing analysis.
An open source .NET deobfuscator and unpacker that restores packed and obfuscated assemblies by reversing various obfuscation techniques.