{"id":21884,"date":"2022-02-17T13:18:19","date_gmt":"2022-02-17T13:18:19","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=21884"},"modified":"2022-02-17T13:18:21","modified_gmt":"2022-02-17T13:18:21","slug":"umay","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/umay\/","title":{"rendered":"Umay : IoT Malware Similarity Analysis Platform"},"content":{"rendered":"\n<p><strong>Umay<\/strong> project provides IoT malware similarity analysis based on shared codes. It helps to identify other malwares that have shared code with the analyzed file. In this way, you can have a chance to get an idea about the family of the malware. There are various devices with different architectures in the IoT ecosystem. Static-based methods are more effective when addressing the multi-architecture issue. 1000 malware binaries provided by&nbsp;IoTPOT&nbsp;were used in the project. The basic blocks and functions of each of binaries were extracted by radare2 and the hash values of these data were stored in the SQL database. The basic blocks and functions of the sample to be analyzed are query from this database and all malwares that have shared code are listed.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\" id=\"current-features\"><a href=\"https:\/\/github.com\/mucoze\/Umay#current-features\"><\/a><strong>Current features<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Shared code based static analysis.<\/li><li>Supporting ARM, MIPS, x86-64, i386, PowerPC, m68k, Renesas SH.<\/li><li>?<\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\" id=\"getting-started\"><a href=\"https:\/\/github.com\/mucoze\/Umay#getting-started\"><\/a><strong>Getting Started<\/strong><\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\" id=\"prerequisites\"><a href=\"https:\/\/github.com\/mucoze\/Umay#prerequisites\"><\/a><strong>Prerequisites<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Python3+<\/li><li>Radare2<ul><li>r2pipe<\/li><\/ul><\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\" id=\"installation\"><a href=\"https:\/\/github.com\/mucoze\/Umay#installation\"><\/a><strong>Installation<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>git clone https:\/\/github.com\/mucoze\/Umay<br>cd Umay<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>virtualenv venv<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>source venv\/bin\/activate<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>pip install -r requirements.txt<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>python manage.py makemigrations<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>python manage.py migrate<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>python manage.py createsuperuser<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>python m<\/strong>anage.py runserver<\/p>\n\n\n\n<p>and now project app is accesible from your browser. Default:&nbsp;<code><strong>127.0.0.1:8000<\/strong><\/code><\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\" id=\"create-your-own-dataset-file\"><a href=\"https:\/\/github.com\/mucoze\/Umay#create-your-own-dataset-file\"><\/a><strong>Create your own dataset file<\/strong><\/p>\n\n\n\n<p><code><strong>python create_dataset.py samples\/<\/strong><\/code><\/p>\n\n\n\n<p>Give the directory where all the samples are located as an argument and it will generate the&nbsp;<code><strong>dataset.db<\/strong><\/code>&nbsp;file for you.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/mucoze\/Umay\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Umay project provides IoT malware similarity analysis based on shared codes. It helps to identify other malwares that have shared code with the analyzed file. In this way, you can have a chance to get an idea about the family of the malware. There are various devices with different architectures in the IoT ecosystem. Static-based [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":21902,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEijJDX23RCOH42WEHiDitXyVud9F3AZJ4w9I5XOUN1BS7_Zpt74AAGaf3xrfAy4mZ4NSaoRdJAamzR8KkZHdLCMvKLLL5I9dbtE20u1DqJpMjtRHHc6g7e1oxbEqEczHeCyF6X7Z5MbCbKOOHeOjRY5nqFZ8RvPGcKkl2PX5cJD1dohaaC0z3jxPJJK=s847","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[4705,4704,4703],"class_list":["post-21884","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-analysis-platform","tag-iot-malware","tag-umay"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Umay : IoT Malware Similarity Analysis Platform !!! Kali Linux<\/title>\n<meta name=\"description\" content=\"Umay project provides IoT malware similarity analysis based on shared codes. It helps to identify other malwares that have shared code.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/umay\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Umay : IoT Malware Similarity Analysis Platform !!! Kali Linux\" \/>\n<meta property=\"og:description\" content=\"Umay project provides IoT malware similarity analysis based on shared codes. It helps to identify other malwares that have shared code.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/umay\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-17T13:18:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-17T13:18:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEijJDX23RCOH42WEHiDitXyVud9F3AZJ4w9I5XOUN1BS7_Zpt74AAGaf3xrfAy4mZ4NSaoRdJAamzR8KkZHdLCMvKLLL5I9dbtE20u1DqJpMjtRHHc6g7e1oxbEqEczHeCyF6X7Z5MbCbKOOHeOjRY5nqFZ8RvPGcKkl2PX5cJD1dohaaC0z3jxPJJK=s847\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEijJDX23RCOH42WEHiDitXyVud9F3AZJ4w9I5XOUN1BS7_Zpt74AAGaf3xrfAy4mZ4NSaoRdJAamzR8KkZHdLCMvKLLL5I9dbtE20u1DqJpMjtRHHc6g7e1oxbEqEczHeCyF6X7Z5MbCbKOOHeOjRY5nqFZ8RvPGcKkl2PX5cJD1dohaaC0z3jxPJJK=s847\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/umay\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/umay\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Umay : IoT Malware Similarity Analysis Platform\",\"datePublished\":\"2022-02-17T13:18:19+00:00\",\"dateModified\":\"2022-02-17T13:18:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/umay\/\"},\"wordCount\":233,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/umay\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEijJDX23RCOH42WEHiDitXyVud9F3AZJ4w9I5XOUN1BS7_Zpt74AAGaf3xrfAy4mZ4NSaoRdJAamzR8KkZHdLCMvKLLL5I9dbtE20u1DqJpMjtRHHc6g7e1oxbEqEczHeCyF6X7Z5MbCbKOOHeOjRY5nqFZ8RvPGcKkl2PX5cJD1dohaaC0z3jxPJJK=s847\",\"keywords\":[\"Analysis Platform\",\"IoT Malware\",\"Umay\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/umay\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/umay\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/umay\/\",\"name\":\"Umay : IoT Malware Similarity Analysis Platform !!! Kali Linux\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/umay\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/umay\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEijJDX23RCOH42WEHiDitXyVud9F3AZJ4w9I5XOUN1BS7_Zpt74AAGaf3xrfAy4mZ4NSaoRdJAamzR8KkZHdLCMvKLLL5I9dbtE20u1DqJpMjtRHHc6g7e1oxbEqEczHeCyF6X7Z5MbCbKOOHeOjRY5nqFZ8RvPGcKkl2PX5cJD1dohaaC0z3jxPJJK=s847\",\"datePublished\":\"2022-02-17T13:18:19+00:00\",\"dateModified\":\"2022-02-17T13:18:21+00:00\",\"description\":\"Umay project provides IoT malware similarity analysis based on shared codes. It helps to identify other malwares that have shared code.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/umay\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/umay\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEijJDX23RCOH42WEHiDitXyVud9F3AZJ4w9I5XOUN1BS7_Zpt74AAGaf3xrfAy4mZ4NSaoRdJAamzR8KkZHdLCMvKLLL5I9dbtE20u1DqJpMjtRHHc6g7e1oxbEqEczHeCyF6X7Z5MbCbKOOHeOjRY5nqFZ8RvPGcKkl2PX5cJD1dohaaC0z3jxPJJK=s847\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEijJDX23RCOH42WEHiDitXyVud9F3AZJ4w9I5XOUN1BS7_Zpt74AAGaf3xrfAy4mZ4NSaoRdJAamzR8KkZHdLCMvKLLL5I9dbtE20u1DqJpMjtRHHc6g7e1oxbEqEczHeCyF6X7Z5MbCbKOOHeOjRY5nqFZ8RvPGcKkl2PX5cJD1dohaaC0z3jxPJJK=s847\",\"width\":\"847\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Umay : IoT Malware Similarity Analysis Platform !!! Kali Linux","description":"Umay project provides IoT malware similarity analysis based on shared codes. It helps to identify other malwares that have shared code.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/umay\/","og_locale":"en_US","og_type":"article","og_title":"Umay : IoT Malware Similarity Analysis Platform !!! Kali Linux","og_description":"Umay project provides IoT malware similarity analysis based on shared codes. It helps to identify other malwares that have shared code.","og_url":"https:\/\/kalilinuxtutorials.com\/umay\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2022-02-17T13:18:19+00:00","article_modified_time":"2022-02-17T13:18:21+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEijJDX23RCOH42WEHiDitXyVud9F3AZJ4w9I5XOUN1BS7_Zpt74AAGaf3xrfAy4mZ4NSaoRdJAamzR8KkZHdLCMvKLLL5I9dbtE20u1DqJpMjtRHHc6g7e1oxbEqEczHeCyF6X7Z5MbCbKOOHeOjRY5nqFZ8RvPGcKkl2PX5cJD1dohaaC0z3jxPJJK=s847","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEijJDX23RCOH42WEHiDitXyVud9F3AZJ4w9I5XOUN1BS7_Zpt74AAGaf3xrfAy4mZ4NSaoRdJAamzR8KkZHdLCMvKLLL5I9dbtE20u1DqJpMjtRHHc6g7e1oxbEqEczHeCyF6X7Z5MbCbKOOHeOjRY5nqFZ8RvPGcKkl2PX5cJD1dohaaC0z3jxPJJK=s847","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/umay\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/umay\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Umay : IoT Malware Similarity Analysis Platform","datePublished":"2022-02-17T13:18:19+00:00","dateModified":"2022-02-17T13:18:21+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/umay\/"},"wordCount":233,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/umay\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEijJDX23RCOH42WEHiDitXyVud9F3AZJ4w9I5XOUN1BS7_Zpt74AAGaf3xrfAy4mZ4NSaoRdJAamzR8KkZHdLCMvKLLL5I9dbtE20u1DqJpMjtRHHc6g7e1oxbEqEczHeCyF6X7Z5MbCbKOOHeOjRY5nqFZ8RvPGcKkl2PX5cJD1dohaaC0z3jxPJJK=s847","keywords":["Analysis Platform","IoT Malware","Umay"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/umay\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/umay\/","url":"https:\/\/kalilinuxtutorials.com\/umay\/","name":"Umay : IoT Malware Similarity Analysis Platform !!! Kali Linux","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/umay\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/umay\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEijJDX23RCOH42WEHiDitXyVud9F3AZJ4w9I5XOUN1BS7_Zpt74AAGaf3xrfAy4mZ4NSaoRdJAamzR8KkZHdLCMvKLLL5I9dbtE20u1DqJpMjtRHHc6g7e1oxbEqEczHeCyF6X7Z5MbCbKOOHeOjRY5nqFZ8RvPGcKkl2PX5cJD1dohaaC0z3jxPJJK=s847","datePublished":"2022-02-17T13:18:19+00:00","dateModified":"2022-02-17T13:18:21+00:00","description":"Umay project provides IoT malware similarity analysis based on shared codes. It helps to identify other malwares that have shared code.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/umay\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/umay\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEijJDX23RCOH42WEHiDitXyVud9F3AZJ4w9I5XOUN1BS7_Zpt74AAGaf3xrfAy4mZ4NSaoRdJAamzR8KkZHdLCMvKLLL5I9dbtE20u1DqJpMjtRHHc6g7e1oxbEqEczHeCyF6X7Z5MbCbKOOHeOjRY5nqFZ8RvPGcKkl2PX5cJD1dohaaC0z3jxPJJK=s847","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEijJDX23RCOH42WEHiDitXyVud9F3AZJ4w9I5XOUN1BS7_Zpt74AAGaf3xrfAy4mZ4NSaoRdJAamzR8KkZHdLCMvKLLL5I9dbtE20u1DqJpMjtRHHc6g7e1oxbEqEczHeCyF6X7Z5MbCbKOOHeOjRY5nqFZ8RvPGcKkl2PX5cJD1dohaaC0z3jxPJJK=s847","width":"847","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEijJDX23RCOH42WEHiDitXyVud9F3AZJ4w9I5XOUN1BS7_Zpt74AAGaf3xrfAy4mZ4NSaoRdJAamzR8KkZHdLCMvKLLL5I9dbtE20u1DqJpMjtRHHc6g7e1oxbEqEczHeCyF6X7Z5MbCbKOOHeOjRY5nqFZ8RvPGcKkl2PX5cJD1dohaaC0z3jxPJJK=s847","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":4193,"url":"https:\/\/kalilinuxtutorials.com\/iot-home-guard\/","url_meta":{"origin":21884,"position":0},"title":"IoT Home Guard : A Tool for Malicious Behavior Detection in IoT Devices","author":"R K","date":"March 14, 2019","format":false,"excerpt":"IoT Home Guard is a project to help people discover malware in smart home devices. For users the project can help to detect compromised smart home devices. For security researchers it is also useful in network analysis and malicious hehaviors detection. In July 2018 we had completed the first version.\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2525,"url":"https:\/\/kalilinuxtutorials.com\/thezoo-repository-malwares\/","url_meta":{"origin":21884,"position":1},"title":"theZoo &#8211; A Repository Of LIVE Malwares For Your Own Joy &#038; Pleasure","author":"R K","date":"September 6, 2018","format":false,"excerpt":"theZoo purpose is to allow the study of malware and enable people who are interested in malware analysis\u00a0to have access to live malware, analyses the ways they operate, and maybe even enable advanced and savvy people to block specific malware within their own environment. We recommend running them in a\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":7001,"url":"https:\/\/kalilinuxtutorials.com\/iot-implant-toolkit-for-implant-attack\/","url_meta":{"origin":21884,"position":2},"title":"IoT Implant : Toolkit For Implant Attack Of IoT Devices","author":"R K","date":"October 24, 2019","format":false,"excerpt":"IoT Implant Toolkit is a framework of useful tools for malware implantation research of IoT devices. It is a toolkit consisted of essential software tools on firmware modification, serial port debugging, software analysis and stable spy clients. With an easy-to-use and extensible shell-like environment, IoT-Implant-Toolkit is a one-stop-shop toolkit simplifies\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":11116,"url":"https:\/\/kalilinuxtutorials.com\/saferwall\/","url_meta":{"origin":21884,"position":3},"title":"Saferwall : An Open Source Malware Analysis Platform","author":"R K","date":"August 4, 2020","format":false,"excerpt":"Saferwall is an open source malware analysis platform. It aims for the following goals: Provide a collaborative platform to share samples among malware researchers.Acts as a system expert, to help researchers generates an automated malware analysis report.Hunting platform to find new malwares.Quality ensurance for signature before releasing. Features Static analysis:Crypto\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":32281,"url":"https:\/\/kalilinuxtutorials.com\/awesome-malware-analysis\/","url_meta":{"origin":21884,"position":4},"title":"Awesome Malware Analysis &#8211; The Ultimate Resource For Tools, Techniques, And Insights","author":"Varshini","date":"March 12, 2024","format":false,"excerpt":"A curated list of awesome malware analysis tools and resources. Inspired by\u00a0awesome-python\u00a0and\u00a0awesome-php. Malware Collection Anonymizers Honeypots Malware Corpora Open Source Threat Intelligence Tools Other Resources Detection and Classification Online Scanners and Sandboxes Domain Analysis Browser Malware Documents and Shellcode File Carving Deobfuscation Debugging and Reverse Engineering Network Memory Forensics Windows\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZeEhaeyqzFUU38GWT2_mG2oknyoqS_l-nsfDc39vngPF2fpXmbr67gE2UQ_8mAA1is22ljPe8wRg8uPtnoIvPnvkKfN6MdUGZdcK3r-hx0asysxy1r7h_vcLmFXwjdlKoCAaJcx-CIUEz7vl_syFiQuyUwc101VaN9RgTUSrbNE7fvOCk7ijeQOhofLB1\/s16000\/Awesome%20Malware%20Analysis%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZeEhaeyqzFUU38GWT2_mG2oknyoqS_l-nsfDc39vngPF2fpXmbr67gE2UQ_8mAA1is22ljPe8wRg8uPtnoIvPnvkKfN6MdUGZdcK3r-hx0asysxy1r7h_vcLmFXwjdlKoCAaJcx-CIUEz7vl_syFiQuyUwc101VaN9RgTUSrbNE7fvOCk7ijeQOhofLB1\/s16000\/Awesome%20Malware%20Analysis%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZeEhaeyqzFUU38GWT2_mG2oknyoqS_l-nsfDc39vngPF2fpXmbr67gE2UQ_8mAA1is22ljPe8wRg8uPtnoIvPnvkKfN6MdUGZdcK3r-hx0asysxy1r7h_vcLmFXwjdlKoCAaJcx-CIUEz7vl_syFiQuyUwc101VaN9RgTUSrbNE7fvOCk7ijeQOhofLB1\/s16000\/Awesome%20Malware%20Analysis%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZeEhaeyqzFUU38GWT2_mG2oknyoqS_l-nsfDc39vngPF2fpXmbr67gE2UQ_8mAA1is22ljPe8wRg8uPtnoIvPnvkKfN6MdUGZdcK3r-hx0asysxy1r7h_vcLmFXwjdlKoCAaJcx-CIUEz7vl_syFiQuyUwc101VaN9RgTUSrbNE7fvOCk7ijeQOhofLB1\/s16000\/Awesome%20Malware%20Analysis%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZeEhaeyqzFUU38GWT2_mG2oknyoqS_l-nsfDc39vngPF2fpXmbr67gE2UQ_8mAA1is22ljPe8wRg8uPtnoIvPnvkKfN6MdUGZdcK3r-hx0asysxy1r7h_vcLmFXwjdlKoCAaJcx-CIUEz7vl_syFiQuyUwc101VaN9RgTUSrbNE7fvOCk7ijeQOhofLB1\/s16000\/Awesome%20Malware%20Analysis%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZeEhaeyqzFUU38GWT2_mG2oknyoqS_l-nsfDc39vngPF2fpXmbr67gE2UQ_8mAA1is22ljPe8wRg8uPtnoIvPnvkKfN6MdUGZdcK3r-hx0asysxy1r7h_vcLmFXwjdlKoCAaJcx-CIUEz7vl_syFiQuyUwc101VaN9RgTUSrbNE7fvOCk7ijeQOhofLB1\/s16000\/Awesome%20Malware%20Analysis%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":30836,"url":"https:\/\/kalilinuxtutorials.com\/guide-ceh-practical-master\/","url_meta":{"origin":21884,"position":5},"title":"Guide-CEH-Practical-Master &#8211; Tools, Techniques And Exam Mastery","author":"Varshini","date":"October 13, 2023","format":false,"excerpt":"Welcome to the 'Guide-CEH-Practical-Master', your essential roadmap to mastering the Certified Ethical Hacker (Practical) exam. Dive deep into the tools, techniques, and insights necessary for success. Let's embark on this journey to achieve professional cybersecurity prowess together Exame Details Exam Title: Certified Ethical Hacker (Practical) Number of Practical Challenges: 20\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhjE_C9ZYIWYc35Gzm4MBUZDn2OErBeNr1K-ZhJ-urodkWA6YCx70AOGZZ-9S0MOC92e4SDyEchljq68yrZZyEhgUZR7a0O-3Du5WVZImPaFGBGZJ0wUonNGobsgtzkwLElGWIVVOlNmJLx27cvyt-kT5ShuggF4G_NPkVO3fgdQ7ZnZOlXcElhHNOu1g\/s16000\/CEH.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhjE_C9ZYIWYc35Gzm4MBUZDn2OErBeNr1K-ZhJ-urodkWA6YCx70AOGZZ-9S0MOC92e4SDyEchljq68yrZZyEhgUZR7a0O-3Du5WVZImPaFGBGZJ0wUonNGobsgtzkwLElGWIVVOlNmJLx27cvyt-kT5ShuggF4G_NPkVO3fgdQ7ZnZOlXcElhHNOu1g\/s16000\/CEH.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhjE_C9ZYIWYc35Gzm4MBUZDn2OErBeNr1K-ZhJ-urodkWA6YCx70AOGZZ-9S0MOC92e4SDyEchljq68yrZZyEhgUZR7a0O-3Du5WVZImPaFGBGZJ0wUonNGobsgtzkwLElGWIVVOlNmJLx27cvyt-kT5ShuggF4G_NPkVO3fgdQ7ZnZOlXcElhHNOu1g\/s16000\/CEH.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhjE_C9ZYIWYc35Gzm4MBUZDn2OErBeNr1K-ZhJ-urodkWA6YCx70AOGZZ-9S0MOC92e4SDyEchljq68yrZZyEhgUZR7a0O-3Du5WVZImPaFGBGZJ0wUonNGobsgtzkwLElGWIVVOlNmJLx27cvyt-kT5ShuggF4G_NPkVO3fgdQ7ZnZOlXcElhHNOu1g\/s16000\/CEH.webp?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/21884","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=21884"}],"version-history":[{"count":18,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/21884\/revisions"}],"predecessor-version":[{"id":21947,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/21884\/revisions\/21947"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/21902"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=21884"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=21884"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=21884"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}