Add markdown wiki with 473 pages and zk browser

Generate interlinked wiki from master inventory: 397 tool pages,
15 workflow pages, 27 recipe pages, 33 category pages, plus index.
All pages use [[wiki-links]] for cross-navigation between tools,
workflows, recipes, and categories (1782 links total).

Install zk for interactive browsing with fzf search, tag filtering,
and backlink discovery. Add 'fhelp wiki' command and Makefile target.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
This commit is contained in:
tobias
2026-03-28 19:50:36 +01:00
parent b13db23a5e
commit e62a14dafc
478 changed files with 7683 additions and 5 deletions
+30
View File
@@ -0,0 +1,30 @@
# speakeasy
> Windows binary emulator — emulates API calls to analyze malware behavior without native execution
**Category:** [[categories/statically-analyze-code-pe-files|Statically Analyze Code > PE Files]] | **Tier:** Rich (FOR610)
**Docs:** [https://docs.remnux.org/discover-the-tools/statically+analyze+code/pe-files](https://docs.remnux.org/discover-the-tools/statically+analyze+code/pe-files)
## Usage
```bash
speakeasy -t specimen.exe -o report.json 2> report.txt
speakeasy -t shellcode.bin -r -a x86
```
## Recipes
- [[recipes/speakeasy-emulation-with-json|Emulate Malware and Extract API Calls]]
## Workflows
- [[workflows/behavioral-analysis-workflow|Behavioral Analysis]] — Step 4: Emulation (Safe Alternative)
- [[workflows/unpacking-workflow|Unpacking Packed Executables]] — Step 3: Emulation-Based Unpacking
- [[workflows/shellcode-analysis-workflow|Shellcode Analysis]] — Step 3: Emulation
## Related Tools
- [[tools/binee-binary-emulation-environment|binee (Binary Emulation Environment)]] — Analyze I/O operations of a suspicious PE file by emulating
- [[tools/capa|capa]] — Identify malware capabilities mapped to MITRE ATT&CK framewo
- [[tools/mbcscan|mbcscan]] — Scan a PE file to list the associated Malware Behavior Catal
## FOR610
**Labs:** 1.4
**Sections:** 1
#emulation #api-calls #behavioral-analysis