QuickSand Logo

QuickSand

0
Free
Visit Website

QuickSand is a compact C framework designed to analyze suspected malware documents, with the ability to identify exploits in streams of different encodings and extract embedded executables, supporting file formats like doc, docx, ppt, pptx, xls, xlsx, and more, including PDF. It can detect documents containing zero-day or unknown obfuscated exploits, with features like XOR Bitwise, math ciphers, executable extraction for Windows, Mac, Linux, VBA, exploit search, Yara signatures, and more.

FEATURES

ALTERNATIVES

Binary Ninja is an interactive decompiler, disassembler, debugger, and binary analysis platform with a focus on automation and a clean GUI.

VMCloak is a tool for creating and preparing Virtual Machines for Cuckoo Sandbox.

A tool to dump ODIN3 messages into files for reverse-engineering

A tool for translating Dalvik bytecode to equivalent Java bytecode, allowing Java analysis tools to analyze Android applications.

A tool for finding and exploiting SQL injection vulnerabilities in web applications

A collection of Yara rules for identifying malicious PEs with unique or suspicious PDB paths.

A .Net wrapper library for the native Yara library with interoperability and portability features.

Ropper is a tool for analyzing binary files and searching for gadgets to build rop chains for different architectures.