ENNAENNA

CAPEv2

๐Ÿ’ฅ Exploitation ยท Python

CAPEv2 (Config And Payload Extraction) is an open-source malware analysis sandbox forked from Cuckoo. It automates the process of detonating malware samples in instrumented virtual machines and extracting behavioral data. CAPEv2 captures API calls, network traffic, dropped files, registry changes, and process trees. Its signature feature is automated payload and configuration extraction from 200+ malware families (Emotet, TrickBot, QakBot, Cobalt Strike, etc.), recovering C2 URLs, encryption keys, and injected payloads. It supports Windows, Linux, and Android analysis VMs with YARA scanning, Suricata network detection, and detailed HTML/JSON reporting.

3.2kstars
562forks
46issues
Updated today
+I use this

Installation

$ git clone https://github.com/kevoreilly/CAPEv2.git && cd CAPEv2 && bash installer/cape2.sh

Use Cases

  • Automated malware detonation and behavior recording
  • Extracting C2 configurations from malware families
  • Generating IOCs from malware network activity
  • Building malware analysis pipelines with API integration

Tags

malware-sandboxbehavioral-analysisconfig-extractionautomated-analysisdetonationcapeconfigsdebugging-toolsmalwaremalware-analysismalware-researchreverse-engineeringsandboxunpacking

Community Reviews

More in Exploitation