FLARE-VM Logo

FLARE-VM

0
Free
Visit Website

Welcome to FLARE-VM - a collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a virtual machine (VM). FLARE-VM was designed to solve the problem of reverse engineering tool curation and relies on two main technologies: Chocolatey and Boxstarter. Chocolatey is a Windows-based Nuget package management system, where a 'package' is essentially a ZIP file containing PowerShell installation scripts that download and configure a specific tool. Boxstarter leverages Chocolatey packages to automate the installation of software and create repeatable, scripted Windows environments. Requirements: - FLARE-VM should ONLY be installed on a virtual machine. - The VM should satisfy the following requirements: Windows >= 10, PowerShell >= 5, Disk capacity of at least 60 GB and memory of at least 2GB, Usernames without spaces or other special characters, Internet connection, Tamper Protection and any Anti-Malware solution (e.g., Windows Defender), Windows Defender disabled, preferably via Group Policy, Windows Updates Disabled. Installation instruction: This section documents the steps to install FLARE-VM.

FEATURES

ALTERNATIVES

VolatilityBot automates binary extraction and memory analysis, including detecting code injections and strings.

An advanced cross-platform tool for detecting and exploiting SQL injection security flaws

A toolkit for detecting and tracking Blind XSS, XXE, and SSRF vulnerabilities

Platform for uploading, searching, and downloading malware samples.

A collection of Yara signatures for identifying malware and other threats

Assembler/disassembler for the dex format used by Dalvik, Android's Java VM implementation.

YaraHunter scans container images, running Docker containers, and filesystems to find indicators of malware.

A PowerShell obfuscation detection framework designed to highlight the limitations of signature-based detection and provide a scalable means of detecting known and unknown obfuscation techniques.