Saruman v0.1 Logo

Saruman v0.1

0
Free
Visit Website

Type make to compile launcher (It will also try to compile a parasite.c file which is for you to supply). Make sure your parasite executable is compiled with -fpic -pie. In this version, Saruman doesn't yet support injecting a program that requires command line args because it is early POC. So <parasite_args> will not actually accept args yet. To run with a more stealth technique of loading the executable, use: ./launcher --no-dlopen <parasite_executable>. Currently, this feature has some bugs and won't work with more complex parasites (To be fixed).

FEATURES

ALTERNATIVES

A backend agnostic debugger frontend for debugging binaries without source code access.

A tool that extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.

A collaborative malware analysis framework with various features for automated analysis tasks.

Python 3 tool for parsing Yara rules with ongoing development.

A collection of Yara signatures for identifying malware and other threats

OCyara performs OCR on image files and scans them for matches to Yara rules, supporting Debian-based Linux distros.

Krakatau provides an assembler and disassembler for Java bytecode, supporting conversion, creation, examination, comparison, and decompilation of Java binaries.

Python wrapper for Android APK decompilation with various converter and decompiler options.