This tool aims to provide a collaborative malware analysis framework. It features sample storage, semi-automated malware analysis, IDA Pro collaboration, online disassembly, binary matching with the MACHOC fuzzy hash algorithm, Yara matching, and automated hotpoints detection. Additionally, it allows sharing IDA Pro information from the WebUI, taking notes directly from IDA, and provides feature documentation. The tool also offers plugins/tasks for analysis tasks and an engine to automate analysis tasks by identifying points of interest inside the malicious binary.
FEATURES
SIMILAR TOOLS
A static analysis tool for PE files that identifies potential malicious indicators through compiler detection, packing analysis, signature matching, and suspicious string identification.
Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
A tool that extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.
A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.
yextend extends Yara's functionality by automatically handling archived and compressed content inflation, enabling pattern matching on files buried within multiple layers of archives.
An open-source dynamic analysis framework that intercepts and monitors API calls in Android applications using the Android Substrate framework.