QuickSand Logo

QuickSand

0
Free
Visit Website

QuickSand is a compact C framework designed to analyze suspected malware documents, with the ability to identify exploits in streams of different encodings and extract embedded executables, supporting file formats like doc, docx, ppt, pptx, xls, xlsx, and more, including PDF. It can detect documents containing zero-day or unknown obfuscated exploits, with features like XOR Bitwise, math ciphers, executable extraction for Windows, Mac, Linux, VBA, exploit search, Yara signatures, and more.

FEATURES

ALTERNATIVES

VolatilityBot automates binary extraction and memory analysis, including detecting code injections and strings.

A minimal library to generate YARA rules from JAVA with maven support.

A tool for injecting and loading executables with a focus on stealth techniques.

A toolkit for detecting and tracking Blind XSS, XXE, and SSRF vulnerabilities

A program to extract IOCs from text files using regular expressions

A Yara ruleset for detecting PHP shells and other webserver malware.

A Burp extension to check JWT tokens for potential weaknesses

A collection of Android Applications with malware analysis results