FLARE Obfuscated String Solver (FLOSS) Logo

FLARE Obfuscated String Solver (FLOSS)

0
Free
Visit Website

The FLARE Obfuscated String Solver (FLOSS, formerly FireEye Labs Obfuscated String Solver) uses advanced static analysis techniques to automatically extract and deobfuscate all strings from malware binaries. You can use it just like strings.exe to enhance the basic static analysis of unknown binaries. Obfuscated Strings Rather than heavily protecting backdoors with hardcore packers, many malware authors evade heuristic detections by obfuscating only key portions of an executable. Often, these portions are strings and resources used to configure domains, files, and other artifacts of an infection. These key features will not show up as plaintext in the output of the strings.exe utility that we commonly use during basic static analysis. FLOSS extracts all the following string types: - static strings: "regular" ASCII and UTF-16LE strings - stack strings: strings constructed on the stack at run-time - tight strings: a special form of stack strings, decoded on the stack - decoded strings: strings decoded in a function Please review the theory behind FLOSS [here](link). Our blog post talks more about the motivation behind FLOSS and details how the tool works. FLOSS version

FEATURES

ALTERNATIVES

A semi-automatic tool to generate YARA rules from virus samples.

Tplmap is a tool for detecting and exploiting server-side template injection vulnerabilities.

Command line tool for testing CRLF injection on a list of domains.

Cybersecurity tool merging DarunGrim's analysis algorithms, currently in internal testing for official release.

Leading open source automated malware analysis system.

A .NET wrapper for libyara that provides a simplified API for developing tools in C# and PowerShell.

VxSig is a tool to automatically generate AV byte signatures from similar binaries.

A tool that scans a corpus of malware and builds a YARA rule to detect similar code sections.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved