Skip to content

Commit 406b24a

Browse files
committed
updated doc
1 parent 4d5c283 commit 406b24a

File tree

2 files changed

+30
-6
lines changed

2 files changed

+30
-6
lines changed

docs/IntelOwl/advanced_usage.md

Lines changed: 28 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -78,9 +78,11 @@ table, th, td {
7878
<li><code>Strings_Info</code></li>
7979
<li><code>ClamAV</code></li>
8080
<li><code>APKiD</code></li>
81-
<li><code>Thug_URL_Info</code>,
82-
<code>Thug_HTML_Info</code></li>
81+
<li><code>Droidlysis</code></li>
82+
<li><code>MobSF</code></li>
83+
<li><code>APK_Artifacts</code></li>
8384
<li><code>BoxJS</code></li>
85+
<li><code>GoReSym</code></li>
8486
<li><code>Qiling_Windows</code>,
8587
<code>Qiling_Windows_Shellcode</code>,
8688
<code>Qiling_Linux</code>,
@@ -90,13 +92,16 @@ table, th, td {
9092
<td>
9193
<ul>
9294
<li>PEFrame performs static analysis on Portable Executable malware and malicious MS Office documents</li>
93-
<li>Capa detects capabilities in executable files</li>
95+
<li>CAPA detects capabilities in executable files</li>
9496
<li>FLOSS automatically deobfuscate strings from malware binaries</li>
9597
<li>String_Info_Classic extracts human-readable strings where as ML version of it ranks them</li>
9698
<li>ClamAV antivirus engine scans files for trojans, viruses, malwares using a multi-threaded daemon</li>
9799
<li>APKiD identifies many compilers, packers, obfuscators, and other weird stuff from an APK or DEX file.</li>
98-
<li>Thug performs hybrid dynamic/static analysis on a URL or HTML page.</li>
100+
<li>Droidlysis is a pre-analysis tool for Android apps</li>
101+
<li>MobSF is a static analysis tool that can find insecure code patterns in your Android and iOS source code</li>
102+
<li>APK_Artifacts is a tool that does APK strings analysis. Useful for first analysis.</li>
99103
<li>Box-JS is a tool for studying JavaScript malware</li>
104+
<li>GoReSym is a Go symbol parser that extracts program metadata, function metadata , filename and line number metadata, and embedded structures and types.</li>
100105
<li>Qiling is a tool for emulating the execution of a binary file or a shellcode.
101106
It requires the configuration of its rootfs, and the optional configuration of profiles.
102107
The rootfs can be copied from the <a href="https://github.com/qilingframework/qiling/tree/master/examples/rootfs"> Qiling project</a>: please remember that Windows dll <b> must</b> be manually added for license reasons.
@@ -136,6 +141,25 @@ table, th, td {
136141
</td>
137142
<td>This framework tries to render a potential phishing page and extract useful information from it. Also, if the page contains a form, it tries to submit the form using fake data. The goal is to extract IOCs and check whether the page is real phishing or not.</td>
138143
</tr>
144+
<tr>
145+
<td>Thug</td>
146+
<td>
147+
<ul>
148+
<li><code>Thug_URL_Info</code></li>
149+
<li><code>Thug_HTML_Info</code></li>
150+
</ul>
151+
</td>
152+
<td>Python low-interaction honeyclient. Thug performs hybrid dynamic/static analysis on a URL or HTML page.</td>
153+
</tr>
154+
<tr>
155+
<td>Nuclei analyzer</td>
156+
<td>
157+
<ul>
158+
<li><code>Nuclei</code></li>
159+
</ul>
160+
</td>
161+
<td>Nuclei is a fast, customizable vulnerability scanner that leverages YAML-based templates to detect, rank, and address security flaws. It operates using structured templates that define specific security checks.</td>
162+
</tr>
139163
</table>
140164

141165
To enable all the optional analyzers you can add the option `--all_analyzers` when starting the project. Example:

docs/IntelOwl/installation.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,8 +14,8 @@ In some systems you could find pre-installed older versions. Please check this a
1414
<p class="admonition-title">Note</p>
1515
<ul>
1616
<li>The project uses public docker images that are available on <a href="https://hub.docker.com/repository/docker/intelowlproject/intelowl">Docker Hub</a></li>
17-
<li>IntelOwl is tested and supported on a Debian-based distros. More precisely we develop and test on Ubuntu, so we suggest using it to have a similar environment in case of troubleshooting. Other Linux-based OS <i>should</i> work but that has not been tested much. It <i>may</i> also run on Windows, but that is not officially supported.</li>
18-
<li>IntelOwl builds are multi-arch so from v6.3.0 onwards IntelOwl supports both AMD64 and ARM64.
17+
<li>IntelOwl is tested and supported on Debian-based distros. More precisely we develop and test on Ubuntu, so we suggest using it to have a similar environment in case of troubleshooting. Other Linux-based OS <i>should</i> work but that has not been tested much. It <i>may</i> also run on Windows, but that is not officially supported.</li>
18+
<li>IntelOwl builds are multi-arch so from v6.3.0 onwards IntelOwl supports both AMD64 and ARM64. Be aware that some integrated tools like [Thug](https://github.com/buffer/thug) do not provide compatibility with ARM64 so not every analyzer is supported.
1919
<li>Before installing remember that you must comply with the <a href="https://github.com/certego/IntelOwl/blob/master/LICENSE">LICENSE</a> and the <a href="https://github.com/certego/IntelOwl/blob/master/.github/legal_notice.md">Legal Terms</a></li>
2020
</ul>
2121
</div>

0 commit comments

Comments
 (0)