FLARE
Industry leading malware analysis
Industry leading malware analysis
The Mandiant FLARE team is a collection of about 40 reverse engineers that analyze malware in support of threat intel, incident response, and computer forensic investigations. We spend our days using disassemblers, debuggers, decompilers, and emulators to figure out what malware does and how we can contain it. We’re known for delivering training sessions that share our experience and releasing open source software that automates the boring things. If you have even a passing interest in reverse engineering or malware analysis, reach out so that we can chat!
Contributor Guidance
Projects
Contributor
Arnav Kharbanda
Mentor
Willi Ballenthin, Moritz, rxrd
Organization
FLARE
Extracting Language and Runtime-Specific Strings in Go, Rust, and Beyond
The FLOSS: Language Specific Strings project aims to enhance the FLARE tool called FLOSS, which is used to deobfuscate protected strings found in...
Contributor
Beleswar Prasad Padhi
Mentor
Tina Johnson, Michael Bailey, Blas Kojusner, Elliot Chernofsky
Organization
FLARE
FakeNet-NG: Implementing an Interactive Graphical Summary of NBIs
FakeNet-NG is a tool that is used to simulate the internet which is useful in malware analysis. Currently, FakeNet-NG displays its output by either...
Contributor
Colton G
Mentor
Willi Ballenthin, Mike Hunhoff, Blas Kojusner, Elliot Chernofsky, Conor Quigley
Organization
FLARE
CAPA: Ghidra Integration
CAPA is the FLARE team’s open-source tool to identify program capabilities using an extensible rule set. Each rule is matched against features that...