CAPE Logo

CAPE

0
Free
Visit Website

CAPE is a malware sandbox used to execute malicious files in an isolated environment, instrument their dynamic behavior, and collect forensic artifacts. It features behavioral instrumentation, file capture, network traffic capture, malware classification, screenshots, memory dumps, automated unpacking, YARA signature-based classification, configuration extraction, debugger automation, anti-sandbox countermeasures, instruction traces, and an interactive desktop. A free demonstration instance is available online for anyone to use.

FEATURES

ALTERNATIVES

Standalone graphical utility for viewing Java source codes from ".class" files.

A software reverse engineering framework with full-featured analysis tools and support for multiple platforms, instruction sets, and executable formats.

A Python script that finds endpoints in JavaScript files to identify potential security vulnerabilities.

YARA module for supporting DCSO format bloom filters with hashlookup capabilities.

A GitHub repository for fuzzing and testing file formats

Collection of slides, materials, demos, crackmes, and writeups from r2con-2017 conference.

Java decompiler GUI tool for Procyon under Apache License.

Guide on emulating Raspberry Pi with QEMU and exploring Arm TrustZone research.