ENNAENNA

al-khaser vs capa

GitHub Stats

6.9k
Stars
6.0k
1.3k
Forks
696
41
Issues
273
26d ago
Updated
today
GPL-2.0
License
Apache-2.0
C++
Language
Python

About al-khaser

al-khaser is a proof-of-concept application that implements numerous malware evasion techniques in a single codebase. It serves as a reference for security researchers studying how malware detects virtual machines, sandboxes, debuggers, and analysis environments. Techniques include timing attacks, CPU feature detection, registry checks, process enumeration, hardware fingerprinting, and API hooking detection. Each technique is implemented, documented, and testable independently. Security teams use al-khaser to validate that their analysis environments and sandboxes are resistant to common evasion methods employed by real-world malware.

About capa

Capa is an automated tool for identifying capabilities in executable files, detecting techniques such as persistence mechanisms, command and control (C2) communications, and anti-analysis methods. Built in Python, Capa uses a rule-based approach to analyze binary files and report on the functionalities they contain. This tool is essential for malware analysis, aiding security researchers in understanding the potential impact of a sample.

Platform Support

๐ŸชŸwindows
๐Ÿงlinux๐ŸŽmacos๐ŸชŸwindows

Tags

al-khaser only

anti-analysisevasionvm-detectionsandbox-detectionanti-debuggingmalware-research

capa only

malware-analysiscapability-detectionreverse-engineeringtriage