View Issue Details

IDProjectCategoryView StatusLast Update
0007387Kali Linux[All Projects] New Tool Requestspublic2021-10-16 13:28
ReporterCYB3RMX Assigned Tog0tmi1k  
PrioritynormalSeverityminorReproducibilityN/A
Status assignedResolutionopen 
Product Version 
Target VersionFixed in Version 
Summary0007387: Qu1cksc0pe -- All in One malware analysis tool.
Description[Name] - Qu1cksc0pe
[Version] - 1.7.6
[Homepage] - https://github.com/CYB3RMX/Qu1cksc0pe
[Download] - https://github.com/CYB3RMX/Qu1cksc0pe
[Author] - CYB3RMX
[License] - Apache-2.0 License
[Description] - Qu1cksc0pe is for analyzing malwares or suspicious files statically also it has capable of analyzing android applications dynamically with frida. You can categorize each Windows APIs based on their possible malicious behaviour, you can get what DLL files used on target binaries, search for interesting strings such as domains crypto wallet addresses etc., running security tests both statically and dynamically against android applications and so on.
[Dependencies] - Python3 and some python modules (puremagic, androguard, frida, apkid, prettytable, tqdm, colorama, oletools, pefile, quark-engine, yara-python, pyaxmlparser, prompt_toolkit), strings tool, VirusTotal API key, readelf tool, JADX decompiler and Genymotion or physical phone for dynamic analysis
[Similar tools] - Don't know
[Activity] - This project started on 18 th october 2019 and it is still active
[How to install] - "sudo python3 qu1cksc0pe.py --install"
[How to use] - "python3 qu1cksc0pe.py --file suspicious_binary --analyze"
[Packaged] - Not for now

Activities

There are no notes attached to this issue.

Issue History

Date Modified Username Field Change
2021-10-11 22:39 CYB3RMX New Issue
2021-10-16 13:28 Gamb1t Assigned To => g0tmi1k
2021-10-16 13:28 Gamb1t Status new => assigned