QuickSand Logo

QuickSand

0
Free
Visit Website

QuickSand is a compact C framework designed to analyze suspected malware documents, with the ability to identify exploits in streams of different encodings and extract embedded executables, supporting file formats like doc, docx, ppt, pptx, xls, xlsx, and more, including PDF. It can detect documents containing zero-day or unknown obfuscated exploits, with features like XOR Bitwise, math ciphers, executable extraction for Windows, Mac, Linux, VBA, exploit search, Yara signatures, and more.

FEATURES

ALTERNATIVES

A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence

Tplmap is a tool for detecting and exploiting server-side template injection vulnerabilities.

A collection of Yara rules for detecting malware evasion techniques

A tool for translating Dalvik bytecode to Java bytecode for analyzing Android applications.

A static analysis tool for PE files that detects malicious behavior and provides information for manual analysis.

An online hash checker utility that retrieves information from various online sources, including Virustotal, HybridAnalysis, and more.

A javascript malware analysis tool with backend code execution.

A wordlist to bruteforce for Local File Inclusion (LFI) vulnerabilities

PINNED