Viper is a binary analysis and management framework that provides a solution to easily organize and analyze malware and exploit samples, as well as scripts. It offers a terminal interface to store, search, and analyze arbitrary files, and a framework to create plugins. It is often referred to as a Metasploit for malware researchers. Viper is released under the BSD 3-Clause license and is copyrighted by Claudio Guarnieri. The source code is available on GitHub, where development efforts and contributions are coordinated. The framework provides various features, including installation, module dependencies, usage, concepts, projects, sessions, commands, and modules. It also offers a web interface, API, and user management, making it a comprehensive tool for malware researchers.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A tool that extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.
yextend extends Yara's functionality by automatically handling archived and compressed content inflation, enabling pattern matching on files buried within multiple layers of archives.
CAPA is a static analysis tool that detects and reports capabilities in executable files across multiple formats, mapping findings to MITRE ATT&CK tactics and techniques.
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
A program to manage yara ruleset in a database with support for different databases and configuration options.
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.