You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/IntelOwl/advanced_usage.md
+28-4Lines changed: 28 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -78,9 +78,11 @@ table, th, td {
78
78
<li><code>Strings_Info</code></li>
79
79
<li><code>ClamAV</code></li>
80
80
<li><code>APKiD</code></li>
81
-
<li><code>Thug_URL_Info</code>,
82
-
<code>Thug_HTML_Info</code></li>
81
+
<li><code>Droidlysis</code></li>
82
+
<li><code>MobSF</code></li>
83
+
<li><code>APK_Artifacts</code></li>
83
84
<li><code>BoxJS</code></li>
85
+
<li><code>GoReSym</code></li>
84
86
<li><code>Qiling_Windows</code>,
85
87
<code>Qiling_Windows_Shellcode</code>,
86
88
<code>Qiling_Linux</code>,
@@ -90,13 +92,16 @@ table, th, td {
90
92
<td>
91
93
<ul>
92
94
<li>PEFrame performs static analysis on Portable Executable malware and malicious MS Office documents</li>
93
-
<li>Capa detects capabilities in executable files</li>
95
+
<li>CAPA detects capabilities in executable files</li>
94
96
<li>FLOSS automatically deobfuscate strings from malware binaries</li>
95
97
<li>String_Info_Classic extracts human-readable strings where as ML version of it ranks them</li>
96
98
<li>ClamAV antivirus engine scans files for trojans, viruses, malwares using a multi-threaded daemon</li>
97
99
<li>APKiD identifies many compilers, packers, obfuscators, and other weird stuff from an APK or DEX file.</li>
98
-
<li>Thug performs hybrid dynamic/static analysis on a URL or HTML page.</li>
100
+
<li>Droidlysis is a pre-analysis tool for Android apps</li>
101
+
<li>MobSF is a static analysis tool that can find insecure code patterns in your Android and iOS source code</li>
102
+
<li>APK_Artifacts is a tool that does APK strings analysis. Useful for first analysis.</li>
99
103
<li>Box-JS is a tool for studying JavaScript malware</li>
104
+
<li>GoReSym is a Go symbol parser that extracts program metadata, function metadata , filename and line number metadata, and embedded structures and types.</li>
100
105
<li>Qiling is a tool for emulating the execution of a binary file or a shellcode.
101
106
It requires the configuration of its rootfs, and the optional configuration of profiles.
102
107
The rootfs can be copied from the <a href="https://github.com/qilingframework/qiling/tree/master/examples/rootfs"> Qiling project</a>: please remember that Windows dll <b> must</b> be manually added for license reasons.
@@ -136,6 +141,25 @@ table, th, td {
136
141
</td>
137
142
<td>This framework tries to render a potential phishing page and extract useful information from it. Also, if the page contains a form, it tries to submit the form using fake data. The goal is to extract IOCs and check whether the page is real phishing or not.</td>
138
143
</tr>
144
+
<tr>
145
+
<td>Thug</td>
146
+
<td>
147
+
<ul>
148
+
<li><code>Thug_URL_Info</code></li>
149
+
<li><code>Thug_HTML_Info</code></li>
150
+
</ul>
151
+
</td>
152
+
<td>Python low-interaction honeyclient. Thug performs hybrid dynamic/static analysis on a URL or HTML page.</td>
153
+
</tr>
154
+
<tr>
155
+
<td>Nuclei analyzer</td>
156
+
<td>
157
+
<ul>
158
+
<li><code>Nuclei</code></li>
159
+
</ul>
160
+
</td>
161
+
<td>Nuclei is a fast, customizable vulnerability scanner that leverages YAML-based templates to detect, rank, and address security flaws. It operates using structured templates that define specific security checks.</td>
162
+
</tr>
139
163
</table>
140
164
141
165
To enable all the optional analyzers you can add the option `--all_analyzers` when starting the project. Example:
Copy file name to clipboardExpand all lines: docs/IntelOwl/installation.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,8 +14,8 @@ In some systems you could find pre-installed older versions. Please check this a
14
14
<pclass="admonition-title">Note</p>
15
15
<ul>
16
16
<li>The project uses public docker images that are available on <ahref="https://hub.docker.com/repository/docker/intelowlproject/intelowl">Docker Hub</a></li>
17
-
<li>IntelOwl is tested and supported on a Debian-based distros. More precisely we develop and test on Ubuntu, so we suggest using it to have a similar environment in case of troubleshooting. Other Linux-based OS <i>should</i> work but that has not been tested much. It <i>may</i> also run on Windows, but that is not officially supported.</li>
18
-
<li>IntelOwl builds are multi-arch so from v6.3.0 onwards IntelOwl supports both AMD64 and ARM64.
17
+
<li>IntelOwl is tested and supported on Debian-based distros. More precisely we develop and test on Ubuntu, so we suggest using it to have a similar environment in case of troubleshooting. Other Linux-based OS <i>should</i> work but that has not been tested much. It <i>may</i> also run on Windows, but that is not officially supported.</li>
18
+
<li>IntelOwl builds are multi-arch so from v6.3.0 onwards IntelOwl supports both AMD64 and ARM64. Be aware that some integrated tools like [Thug](https://github.com/buffer/thug) do not provide compatibility with ARM64 so not every analyzer is supported.
19
19
<li>Before installing remember that you must comply with the <ahref="https://github.com/certego/IntelOwl/blob/master/LICENSE">LICENSE</a> and the <ahref="https://github.com/certego/IntelOwl/blob/master/.github/legal_notice.md">Legal Terms</a></li>
0 commit comments