Tools

This page will eventually contain subpages explaining how to use the tools I currently rely on. For now, it serves as a reference list of the tools I mainly use when analyzing standard executables.

My lab setup is largely based on the one shown in this video: https://www.youtube.com/watch?v=luTt0_NxoG0, using Windows 10.

For static analysis, I use:

  • floss: http://github.com/mandiant/flare-floss/tree/master
  • capa: https://github.com/mandiant/capa
  • pestudio: https://www.winitor.com/
  • Ghidra: https://github.com/NationalSecurityAgency/ghidra

For dynamic analysis, I use:

  • Procmon: https://learn.microsoft.com/en-us/sysinternals/downloads/procmon
  • System Informer: https://systeminformer.sourceforge.io/
  • Regshot: https://github.com/Seabreg/Regshot
  • Wireshark: https://www.wireshark.org/
  • INetSim: https://www.inetsim.org/
  • x32dbg and x64dbg: https://x64dbg.com/