Linux-based toolkit distribution designed for reverse engineers, malware analysts and incident responders. The toolkit includes security tools such as debuggers, disassemblers, decompilers, static and dynamic analysis utilities, network analysis and many others.
The RE-Toolkit will be used on Botnet Mitigation Course for setting up the lab environment in order to perform static and dynamic code analysis on malware samples.
- Tested on Ubuntu 20.04.1 LTS (Focal Fossa)
- Compatible and tested with Python ver 3.9.1
Reverse Engineering toolkit is a open-source toolset that helps reverse engineers, malware analysts and incident responders to perform advance code analysis using debuggers, disassemblers, decompilers etc.
The tool kit consists of:
Plugins | README |
---|---|
Volatility | Volatility |
Burp | Burp |
AnalyzePDF | AnalyzePDF.py |
CapTipper | CapTipper v0.3 |
Ciphey | Ciphey |
Exescan | Exescan |
IOCextractor | IOCextractor |
... | to add |
The toolkit requires Python V3+ to run.
$ apt-get install git -y
$ cd /home/$SUDO_USER
$ git clone --recursive https://github.com/upxnoops/RE-Toolkit
$ chmod +x /home/$SUDO_USER/RE-Toolkit/setup.sh
$ /home/$SUDO_USER/RE-Toolkit/setup.sh
- Add more tools developed by the open-source comunity.
- Check for updates and compatibility