fexecve harness Logo

fexecve harness

0
Free
Visit Website

These tools execute programs in memory. Programs can be delivered via stdin or from an URL. **From URL:** This will download a file from a host and execute it with arguments. **Using netcat (method1):** This connects to a host on a port to receive the payload. **Using netcat (method2):** This listens for incoming connections on a port to receive the payload.

FEATURES

ALTERNATIVES

A sandbox for quickly sandboxing known or unknown families of Android Malware

A Yara ruleset for detecting PHP shells and other webserver malware.

A serverless, real-time, and retroactive malware detection tool that scans files with YARA rules and alerts incident response teams.

A tool for signature analysis of RTF files to detect potentially unique parts and malicious documents.

A framework for reverse engineering Flutter apps with modified Flutter library for dynamic analysis and traffic monitoring.

A tool to find XSS vulnerabilities in web applications

A tool for hacking and security testing of JWT

A program to extract IOCs from text files using regular expressions