Files
docker_file_analysis/data/generated/wiki/tools/floss.md
T
tobias e62a14dafc Add markdown wiki with 473 pages and zk browser
Generate interlinked wiki from master inventory: 397 tool pages,
15 workflow pages, 27 recipe pages, 33 category pages, plus index.
All pages use [[wiki-links]] for cross-navigation between tools,
workflows, recipes, and categories (1782 links total).

Install zk for interactive browsing with fzf search, tag filtering,
and backlink discovery. Add 'fhelp wiki' command and Makefile target.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-28 19:50:36 +01:00

34 lines
1.5 KiB
Markdown

# FLOSS
> Automatically extract obfuscated strings from malware using static analysis, stack strings, and emulation
**Category:** [[categories/examine-static-properties-deobfuscation|Examine Static Properties > Deobfuscation]] | **Tier:** Rich (FOR610)
**Docs:** [https://docs.remnux.org/discover-the-tools/examine+static+properties/deobfuscation](https://docs.remnux.org/discover-the-tools/examine+static+properties/deobfuscation)
## Usage
```bash
floss specimen.exe
floss specimen.exe > strings-output.txt
floss --no-static -- specimen.exe
```
## Recipes
- [[recipes/stack-string-extraction|Extract Stack-Built Strings]]
## Workflows
- [[workflows/static-analysis-workflow|Static Properties Analysis]] — Step 4: String Extraction
- [[workflows/shellcode-analysis-workflow|Shellcode Analysis]] — Step 6: String & IOC Extraction
- [[workflows/string-deobfuscation-workflow|String & Data Deobfuscation]] — Step 1: Automated Extraction
## Related Tools
- [[tools/1768|1768.py]] — Parse Cobalt Strike beacon configuration from shellcode or m
- [[tools/balbuzard|balbuzard]] — Extract and deobfuscate patterns from suspicious files.
- [[tools/base64dump|base64dump.py]] — Extract and decode Base64-encoded strings from files
- [[tools/brxor|brxor.py]] — Brute-force XOR key detection for single-byte XOR-encoded st
- [[tools/chepy|chepy]] — Decode and otherwise analyze data using this command-line to
## FOR610
**Labs:** 5.2, 5.3
**Sections:** 5
#strings #deobfuscation #automated