Viper Logo

Viper

0
Free
Visit Website

Viper is a binary analysis and management framework that provides a solution to easily organize and analyze malware and exploit samples, as well as scripts. It offers a terminal interface to store, search, and analyze arbitrary files, and a framework to create plugins. It is often referred to as a Metasploit for malware researchers. Viper is released under the BSD 3-Clause license and is copyrighted by Claudio Guarnieri. The source code is available on GitHub, where development efforts and contributions are coordinated. The framework provides various features, including installation, module dependencies, usage, concepts, projects, sessions, commands, and modules. It also offers a web interface, API, and user management, making it a comprehensive tool for malware researchers.

FEATURES

ALTERNATIVES

A project providing open-source YARA rules for malware and malicious file detection

PINCE is a front-end/reverse engineering tool for the GNU Project Debugger (GDB), focused on games, with CheatEngine-like value type support and memory searching capabilities.

dynStruct is a tool for monitoring memory accesses of an ELF binary and recovering structures of the original code.

A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.

A Python script that finds endpoints in JavaScript files to identify potential security vulnerabilities.

Define and validate YARA rule metadata with CCCS YARA Specification.

A library for running basic functions from stripped binaries cross platform.

A .NET wrapper for libyara that provides a simplified API for developing tools in C# and PowerShell.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved