{"id":11116,"date":"2020-08-04T18:42:01","date_gmt":"2020-08-04T13:12:01","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=11116"},"modified":"2020-08-04T18:42:01","modified_gmt":"2020-08-04T13:12:01","slug":"saferwall","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/saferwall\/","title":{"rendered":"Saferwall : An Open Source Malware Analysis Platform"},"content":{"rendered":"\n<p><strong>Saferwall<\/strong> is an open source malware analysis platform. It aims for the following goals:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Provide a collaborative platform to share samples among malware researchers.<\/li><li>Acts as a system expert, to help researchers generates an automated malware analysis report.<\/li><li>Hunting platform to find new malwares.<\/li><li>Quality ensurance for signature before releasing.<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-XBsjy1iEeHI\/Xx3V5OAG1zI\/AAAAAAAAHI0\/PACioYhoDrQg-NDjNSNWMfV28d2gEPclgCLcBGAsYHQ\/s1600\/Saferwall-1.png\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Features<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Static analysis:<ul><li>Crypto hashes, packer identification<\/li><li>Strings extraction<\/li><li>Portable Executable file parser<\/li><\/ul><\/li><li>Multiple AV scanner which includes major antivirus vendors: Vendors status Vendors status Avast \u2714\ufe0f FSecure \u2714\ufe0f Avira \u2714\ufe0f Kaspersky \u2714\ufe0f Bitdefender \u2714\ufe0f McAfee \u2714\ufe0f ClamAV \u2714\ufe0f Sophos \u2714\ufe0f Comodo \u2714\ufe0f Symantec \u2714\ufe0f ESET \u2714\ufe0f Windows Defender \u2714\ufe0f<\/li><\/ul>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Installation<\/strong><\/p>\n\n\n\n<p>Saferwall take advantage of <a href=\"https:\/\/kubernetes.io\/\">kubernetes<\/a> for its high availability, scalibility and the huge ecosystem behind it.<\/p>\n\n\n\n<p>Everything runs inside Kubernetes. You can either deploy it in the cloud or have it self hosted.<\/p>\n\n\n\n<p>To make it easy to get a production grade Kubernetes cluster up and running, we use <a href=\"https:\/\/github.com\/kubernetes\/kops\">kops<\/a>. It automatically provisions a kubernetes cluster hosted on AWS, GCE, DigitalOcean or OpenStack and also on bare metal. For the time being, only AWS is officially supported. Refer to the following <a href=\"https:\/\/github.com\/saferwall\/saferwall\/blob\/master\/docs\/BUILDING.md\">link<\/a> for how to setup.<\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Built With<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Golang mostly.<\/li><li>Backend: <a href=\"https:\/\/echo.labstack.com\/\">Echo<\/a><\/li><li>Frontend: <a href=\"https:\/\/vuejs.org\/\">VueJS<\/a> + <a href=\"https:\/\/bulma.io\/\">Bulma<\/a><\/li><li>Messaging: <a href=\"https:\/\/nsq.io\/\">NSQ<\/a><\/li><li>Database: <a href=\"https:\/\/www.couchbase.com\/\">Couchbase<\/a><\/li><li>Logging: <a href=\"https:\/\/www.elastic.co\/beats\/filebeat\">FileBeat<\/a> + <a href=\"https:\/\/www.elastic.co\/\">ElasticSearch<\/a> + <a href=\"https:\/\/www.elastic.co\/\">Kibanna<\/a><\/li><li>Minio: <a href=\"https:\/\/min.io\/\">Object storage<\/a><\/li><li>Deployment: <a href=\"https:\/\/helm.sh\/\">Helm<\/a> + <a href=\"https:\/\/kubernetes.io\/\">Kubernetes<\/a><\/li><\/ul>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Current Architecture \/ Workflow<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-9bOHmachDcU\/Xx3V5DDiOjI\/AAAAAAAAHI4\/Qe9Y37N2mEoCkIGu_HloUhUIpZQBE0ZkQCLcBGAsYHQ\/s1600\/Workflow.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<p>Here is a basic workflow which happens during a file scan:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Frontend talks to the the backend via REST APIs.<\/li><li>Backend uploads samples to the object storage.<\/li><li>Backend pushes a message into the scanning queue.<\/li><li>Consumer fetches the file and copy it into to the nfs share avoiding to pull the sample on every container.<\/li><li>Consumer calls asynchronously scanning services (like AV scanners) via gRPC calls and waits for results.<\/li><\/ul>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Acknowledgements<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/github.com\/fundon\">Fangdun Cai<\/a> for the awesome vue-admin dashboard.<\/li><li><a href=\"https:\/\/github.com\/horsicq\">horsicq<\/a> for his tool <a href=\"https:\/\/github.com\/horsicq\/Detect-It-Easy\">Detect It Easy<\/a>.<\/li><\/ul>\n\n\n\n<div class=\"wp-block-buttons aligncenter is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/saferwall\/saferwall\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Saferwall is an open source malware analysis platform. It aims for the following goals: Provide a collaborative platform to share samples among malware researchers. Acts as a system expert, to help researchers generates an automated malware analysis report. Hunting platform to find new malwares. Quality ensurance for signature before releasing. Features Static analysis: Crypto hashes, [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16442,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-0gKenbq0bdw\/Xx3V4p_8q5I\/AAAAAAAAHIw\/GB_x95xPYU0a5pMOLUvvqh-RLbej-rC6QCLcBGAsYHQ\/s1600\/Saferwall%25281%2529.png","fifu_image_alt":"Saferwall : An Open Source Malware Analysis Platform","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[2000,2327,2921],"class_list":["post-11116","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-malware","tag-open-source-2","tag-saferwall"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Saferwall : An Open Source Malware Analysis Platform<\/title>\n<meta name=\"description\" content=\"Saferwall is an open source malware analysis platform. It aims for the following goals:\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/saferwall\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Saferwall : An Open Source Malware Analysis Platform\" \/>\n<meta property=\"og:description\" content=\"Saferwall is an open source malware analysis platform. It aims for the following goals:\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/saferwall\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-04T13:12:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-0gKenbq0bdw\/Xx3V4p_8q5I\/AAAAAAAAHIw\/GB_x95xPYU0a5pMOLUvvqh-RLbej-rC6QCLcBGAsYHQ\/s1600\/Saferwall%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-0gKenbq0bdw\/Xx3V4p_8q5I\/AAAAAAAAHIw\/GB_x95xPYU0a5pMOLUvvqh-RLbej-rC6QCLcBGAsYHQ\/s1600\/Saferwall%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/saferwall\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/saferwall\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Saferwall : An Open Source Malware Analysis Platform\",\"datePublished\":\"2020-08-04T13:12:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/saferwall\/\"},\"wordCount\":294,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/saferwall\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-0gKenbq0bdw\/Xx3V4p_8q5I\/AAAAAAAAHIw\/GB_x95xPYU0a5pMOLUvvqh-RLbej-rC6QCLcBGAsYHQ\/s1600\/Saferwall%25281%2529.png\",\"keywords\":[\"Malware\",\"Open Source\",\"Saferwall\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/saferwall\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/saferwall\/\",\"name\":\"Saferwall : An Open Source Malware Analysis Platform\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/saferwall\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/saferwall\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-0gKenbq0bdw\/Xx3V4p_8q5I\/AAAAAAAAHIw\/GB_x95xPYU0a5pMOLUvvqh-RLbej-rC6QCLcBGAsYHQ\/s1600\/Saferwall%25281%2529.png\",\"datePublished\":\"2020-08-04T13:12:01+00:00\",\"description\":\"Saferwall is an open source malware analysis platform. It aims for the following goals:\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/saferwall\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/saferwall\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-0gKenbq0bdw\/Xx3V4p_8q5I\/AAAAAAAAHIw\/GB_x95xPYU0a5pMOLUvvqh-RLbej-rC6QCLcBGAsYHQ\/s1600\/Saferwall%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-0gKenbq0bdw\/Xx3V4p_8q5I\/AAAAAAAAHIw\/GB_x95xPYU0a5pMOLUvvqh-RLbej-rC6QCLcBGAsYHQ\/s1600\/Saferwall%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Saferwall : An Open Source Malware Analysis Platform","description":"Saferwall is an open source malware analysis platform. It aims for the following goals:","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/saferwall\/","og_locale":"en_US","og_type":"article","og_title":"Saferwall : An Open Source Malware Analysis Platform","og_description":"Saferwall is an open source malware analysis platform. It aims for the following goals:","og_url":"https:\/\/kalilinuxtutorials.com\/saferwall\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2020-08-04T13:12:01+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-0gKenbq0bdw\/Xx3V4p_8q5I\/AAAAAAAAHIw\/GB_x95xPYU0a5pMOLUvvqh-RLbej-rC6QCLcBGAsYHQ\/s1600\/Saferwall%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-0gKenbq0bdw\/Xx3V4p_8q5I\/AAAAAAAAHIw\/GB_x95xPYU0a5pMOLUvvqh-RLbej-rC6QCLcBGAsYHQ\/s1600\/Saferwall%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/saferwall\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/saferwall\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Saferwall : An Open Source Malware Analysis Platform","datePublished":"2020-08-04T13:12:01+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/saferwall\/"},"wordCount":294,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/saferwall\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-0gKenbq0bdw\/Xx3V4p_8q5I\/AAAAAAAAHIw\/GB_x95xPYU0a5pMOLUvvqh-RLbej-rC6QCLcBGAsYHQ\/s1600\/Saferwall%25281%2529.png","keywords":["Malware","Open Source","Saferwall"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/saferwall\/","url":"https:\/\/kalilinuxtutorials.com\/saferwall\/","name":"Saferwall : An Open Source Malware Analysis Platform","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/saferwall\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/saferwall\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-0gKenbq0bdw\/Xx3V4p_8q5I\/AAAAAAAAHIw\/GB_x95xPYU0a5pMOLUvvqh-RLbej-rC6QCLcBGAsYHQ\/s1600\/Saferwall%25281%2529.png","datePublished":"2020-08-04T13:12:01+00:00","description":"Saferwall is an open source malware analysis platform. It aims for the following goals:","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/saferwall\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/saferwall\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-0gKenbq0bdw\/Xx3V4p_8q5I\/AAAAAAAAHIw\/GB_x95xPYU0a5pMOLUvvqh-RLbej-rC6QCLcBGAsYHQ\/s1600\/Saferwall%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-0gKenbq0bdw\/Xx3V4p_8q5I\/AAAAAAAAHIw\/GB_x95xPYU0a5pMOLUvvqh-RLbej-rC6QCLcBGAsYHQ\/s1600\/Saferwall%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-0gKenbq0bdw\/Xx3V4p_8q5I\/AAAAAAAAHIw\/GB_x95xPYU0a5pMOLUvvqh-RLbej-rC6QCLcBGAsYHQ\/s1600\/Saferwall%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":32281,"url":"https:\/\/kalilinuxtutorials.com\/awesome-malware-analysis\/","url_meta":{"origin":11116,"position":0},"title":"Awesome Malware Analysis &#8211; The Ultimate Resource For Tools, Techniques, And Insights","author":"Varshini","date":"March 12, 2024","format":false,"excerpt":"A curated list of awesome malware analysis tools and resources. Inspired by\u00a0awesome-python\u00a0and\u00a0awesome-php. Malware Collection Anonymizers Honeypots Malware Corpora Open Source Threat Intelligence Tools Other Resources Detection and Classification Online Scanners and Sandboxes Domain Analysis Browser Malware Documents and Shellcode File Carving Deobfuscation Debugging and Reverse Engineering Network Memory Forensics Windows\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZeEhaeyqzFUU38GWT2_mG2oknyoqS_l-nsfDc39vngPF2fpXmbr67gE2UQ_8mAA1is22ljPe8wRg8uPtnoIvPnvkKfN6MdUGZdcK3r-hx0asysxy1r7h_vcLmFXwjdlKoCAaJcx-CIUEz7vl_syFiQuyUwc101VaN9RgTUSrbNE7fvOCk7ijeQOhofLB1\/s16000\/Awesome%20Malware%20Analysis%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZeEhaeyqzFUU38GWT2_mG2oknyoqS_l-nsfDc39vngPF2fpXmbr67gE2UQ_8mAA1is22ljPe8wRg8uPtnoIvPnvkKfN6MdUGZdcK3r-hx0asysxy1r7h_vcLmFXwjdlKoCAaJcx-CIUEz7vl_syFiQuyUwc101VaN9RgTUSrbNE7fvOCk7ijeQOhofLB1\/s16000\/Awesome%20Malware%20Analysis%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZeEhaeyqzFUU38GWT2_mG2oknyoqS_l-nsfDc39vngPF2fpXmbr67gE2UQ_8mAA1is22ljPe8wRg8uPtnoIvPnvkKfN6MdUGZdcK3r-hx0asysxy1r7h_vcLmFXwjdlKoCAaJcx-CIUEz7vl_syFiQuyUwc101VaN9RgTUSrbNE7fvOCk7ijeQOhofLB1\/s16000\/Awesome%20Malware%20Analysis%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZeEhaeyqzFUU38GWT2_mG2oknyoqS_l-nsfDc39vngPF2fpXmbr67gE2UQ_8mAA1is22ljPe8wRg8uPtnoIvPnvkKfN6MdUGZdcK3r-hx0asysxy1r7h_vcLmFXwjdlKoCAaJcx-CIUEz7vl_syFiQuyUwc101VaN9RgTUSrbNE7fvOCk7ijeQOhofLB1\/s16000\/Awesome%20Malware%20Analysis%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZeEhaeyqzFUU38GWT2_mG2oknyoqS_l-nsfDc39vngPF2fpXmbr67gE2UQ_8mAA1is22ljPe8wRg8uPtnoIvPnvkKfN6MdUGZdcK3r-hx0asysxy1r7h_vcLmFXwjdlKoCAaJcx-CIUEz7vl_syFiQuyUwc101VaN9RgTUSrbNE7fvOCk7ijeQOhofLB1\/s16000\/Awesome%20Malware%20Analysis%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZeEhaeyqzFUU38GWT2_mG2oknyoqS_l-nsfDc39vngPF2fpXmbr67gE2UQ_8mAA1is22ljPe8wRg8uPtnoIvPnvkKfN6MdUGZdcK3r-hx0asysxy1r7h_vcLmFXwjdlKoCAaJcx-CIUEz7vl_syFiQuyUwc101VaN9RgTUSrbNE7fvOCk7ijeQOhofLB1\/s16000\/Awesome%20Malware%20Analysis%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":11975,"url":"https:\/\/kalilinuxtutorials.com\/freki\/","url_meta":{"origin":11116,"position":1},"title":"Freki : Malware Analysis Platform","author":"R K","date":"December 22, 2020","format":false,"excerpt":"Freki is a free and open-source malware analysis platform. Goals Facilitate malware analysis and reverse engineering;Provide an easy-to-use REST API for different projects;Easy deployment (via Docker);Allow the addition of new features by the community. Current Features Hash extraction.VirusTotal API queries.Static analysis of PE files (headers, sections, imports, capabilities, and strings).Pattern\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/AW4afoaogt0\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":21884,"url":"https:\/\/kalilinuxtutorials.com\/umay\/","url_meta":{"origin":11116,"position":2},"title":"Umay : IoT Malware Similarity Analysis Platform","author":"R K","date":"February 17, 2022","format":false,"excerpt":"Umay project provides IoT malware similarity analysis based on shared codes. It helps to identify other malwares that have shared code with the analyzed file. In this way, you can have a chance to get an idea about the family of the malware. There are various devices with different architectures\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEijJDX23RCOH42WEHiDitXyVud9F3AZJ4w9I5XOUN1BS7_Zpt74AAGaf3xrfAy4mZ4NSaoRdJAamzR8KkZHdLCMvKLLL5I9dbtE20u1DqJpMjtRHHc6g7e1oxbEqEczHeCyF6X7Z5MbCbKOOHeOjRY5nqFZ8RvPGcKkl2PX5cJD1dohaaC0z3jxPJJK=s847","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEijJDX23RCOH42WEHiDitXyVud9F3AZJ4w9I5XOUN1BS7_Zpt74AAGaf3xrfAy4mZ4NSaoRdJAamzR8KkZHdLCMvKLLL5I9dbtE20u1DqJpMjtRHHc6g7e1oxbEqEczHeCyF6X7Z5MbCbKOOHeOjRY5nqFZ8RvPGcKkl2PX5cJD1dohaaC0z3jxPJJK=s847 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEijJDX23RCOH42WEHiDitXyVud9F3AZJ4w9I5XOUN1BS7_Zpt74AAGaf3xrfAy4mZ4NSaoRdJAamzR8KkZHdLCMvKLLL5I9dbtE20u1DqJpMjtRHHc6g7e1oxbEqEczHeCyF6X7Z5MbCbKOOHeOjRY5nqFZ8RvPGcKkl2PX5cJD1dohaaC0z3jxPJJK=s847 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEijJDX23RCOH42WEHiDitXyVud9F3AZJ4w9I5XOUN1BS7_Zpt74AAGaf3xrfAy4mZ4NSaoRdJAamzR8KkZHdLCMvKLLL5I9dbtE20u1DqJpMjtRHHc6g7e1oxbEqEczHeCyF6X7Z5MbCbKOOHeOjRY5nqFZ8RvPGcKkl2PX5cJD1dohaaC0z3jxPJJK=s847 2x"},"classes":[]},{"id":2525,"url":"https:\/\/kalilinuxtutorials.com\/thezoo-repository-malwares\/","url_meta":{"origin":11116,"position":3},"title":"theZoo &#8211; A Repository Of LIVE Malwares For Your Own Joy &#038; Pleasure","author":"R K","date":"September 6, 2018","format":false,"excerpt":"theZoo purpose is to allow the study of malware and enable people who are interested in malware analysis\u00a0to have access to live malware, analyses the ways they operate, and maybe even enable advanced and savvy people to block specific malware within their own environment. We recommend running them in a\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":11749,"url":"https:\/\/kalilinuxtutorials.com\/awesome-android-security\/","url_meta":{"origin":11116,"position":4},"title":"Awesome Android Security","author":"R K","date":"November 4, 2020","format":false,"excerpt":"A curated list of Android Security materials and resources For Pentesters and Bug Hunters. Blog AAPG - Android application penetration testing guideTikTok: three persistent arbitrary code executions and one theft of arbitrary filesPersistent arbitrary code execution in Android's Google Play Core Library: details, explanation and the PoC - CVE-2020-8913Android: Access\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6888,"url":"https:\/\/kalilinuxtutorials.com\/malconfscan-extracts-configuration-data-malware\/","url_meta":{"origin":11116,"position":5},"title":"MalConfScan : Volatility Plugin For Extracts Configuration Data Of Known Malware","author":"R K","date":"October 15, 2019","format":false,"excerpt":"MalConfScan\u00a0is a\u00a0Volatility\u00a0plugin extracts configuration data of known malware. Volatility is an open-source memory forensics framework for incident response and malware analysis. This tool searches for malware in memory images and dumps configuration data. In addition, this tool has a function to list strings to which malicious code refers. Supported Malware\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/11116","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=11116"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/11116\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16442"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=11116"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=11116"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=11116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}