These tools execute programs in memory. Programs can be delivered via stdin or from an URL. **From URL:** This will download a file from a host and execute it with arguments. **Using netcat (method1):** This connects to a host on a port to receive the payload. **Using netcat (method2):** This listens for incoming connections on a port to receive the payload.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A collaborative malware analysis framework with various features for automated analysis tasks.
PinCTF is a tool for using Intel's Pin Tool to instrument reverse engineering binaries and count instructions.
A tool that extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.
A sandbox for quickly sandboxing known or unknown families of Android Malware
A program to manage yara ruleset in a database with support for different databases and configuration options.
Joe Sandbox Community provides automated cloud-based malware analysis across multiple OS platforms.
A tool designed to handle archive file data and augment Yara's capabilities.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.