e62a14dafc
Generate interlinked wiki from master inventory: 397 tool pages, 15 workflow pages, 27 recipe pages, 33 category pages, plus index. All pages use [[wiki-links]] for cross-navigation between tools, workflows, recipes, and categories (1782 links total). Install zk for interactive browsing with fzf search, tag filtering, and backlink discovery. Add 'fhelp wiki' command and Makefile target. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
1.5 KiB
1.5 KiB
FLOSS
Automatically extract obfuscated strings from malware using static analysis, stack strings, and emulation
Category: categories/examine-static-properties-deobfuscation | Tier: Rich (FOR610) Docs: https://docs.remnux.org/discover-the-tools/examine+static+properties/deobfuscation
Usage
floss specimen.exe
floss specimen.exe > strings-output.txt
floss --no-static -- specimen.exe
Recipes
Workflows
- workflows/static-analysis-workflow — Step 4: String Extraction
- workflows/shellcode-analysis-workflow — Step 6: String & IOC Extraction
- workflows/string-deobfuscation-workflow — Step 1: Automated Extraction
Related Tools
- tools/1768 — Parse Cobalt Strike beacon configuration from shellcode or m
- tools/balbuzard — Extract and deobfuscate patterns from suspicious files.
- tools/base64dump — Extract and decode Base64-encoded strings from files
- tools/brxor — Brute-force XOR key detection for single-byte XOR-encoded st
- tools/chepy — Decode and otherwise analyze data using this command-line to
FOR610
Labs: 5.2, 5.3 Sections: 5
#strings #deobfuscation #automated