Viper is a binary analysis and management framework that provides a solution to easily organize and analyze malware and exploit samples, as well as scripts. It offers a terminal interface to store, search, and analyze arbitrary files, and a framework to create plugins. It is often referred to as a Metasploit for malware researchers. Viper is released under the BSD 3-Clause license and is copyrighted by Claudio Guarnieri. The source code is available on GitHub, where development efforts and contributions are coordinated. The framework provides various features, including installation, module dependencies, usage, concepts, projects, sessions, commands, and modules. It also offers a web interface, API, and user management, making it a comprehensive tool for malware researchers.
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
Malware sandbox for executing malicious files in an isolated environment with advanced features.
Go bindings for YARA with installation and build instructions.
Tool for fingerprinting malware HTTP requests.
A static analysis tool for PE files that detects malicious behavior and provides information for manual analysis.
Explores malware interaction with Windows API and methods for detection and prevention.
A library for checking potentially malicious files and archives using YARA and making a decision about their harmfulness.