npx skills add https://github.com/ljagiello/ctf-skills --skill ctf-malware针对恶意软件分析 CTF 挑战的快速参考。每种技术在此处都有一行命令说明;完整细节和代码请参阅支持文件。
eval/bash 替换为 echo 以打印底层代码;提取 base64/hex 数据块并用 file 分析。参见 scripts-and-obfuscation.md。广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
eval 替换为 console.log,解码 unescape()、atob()、String.fromCharCode()。-enc base64,将 IEX 替换为输出。参见 scripts-and-obfuscation.md。call 目标。参见 scripts-and-obfuscation.md。tshark -r file.pcap -Y "tcp.stream eq X" -T fields -e tcp.payload
在非常规端口上寻找 C2。使用 strings | grep 提取 IP/域名。参见 c2-and-protocols.md。
tcprewrite 重映射端口,添加 RSA 密钥用于 TLS 解密,在二进制文件中查找 RC4 密钥。参见 c2-and-protocols.md。0x637c777b S-box;ChaCha20:expand 32-byte k;TEA/XTEA:0x9E3779B9;RC4:顺序 S-box 初始化。参见 c2-and-protocols.md。peframe malware.exe # 快速分类
pe-sieve # 运行时分析
pestudio # 静态分析 (Windows)
参见 pe-and-dotnet.md。
虚拟机检测(CPUID、MAC 前缀、注册表、磁盘大小)、时间规避(sleep/RDTSC 沙箱检测)、API 哈希(ROR13/DJB2/CRC32 + hashdb 查找)、进程注入(空洞化、APC、CreateRemoteThread)、环境检查。参见 scripts-and-obfuscation.md。
pyinstxtractor.py 提取,使用 PyArmor-Unpacker 处理受保护的代码。参见 pe-and-dotnet.md。getUpdates 和 getFile API。参见 c2-and-protocols.md。ar -x package.deb && tar -xf control.tar.xz # 检查 postinst 脚本
编写 YARA 规则以匹配字节模式、字符串和正则表达式来检查文件或内存转储。检测 XOR 循环({31 ?? 80 ?? ?? 4? 75})、base64 数据块、编码的 PowerShell。使用 yarac 编译以加速扫描。参见 scripts-and-obfuscation.md。
使用 objdump -b binary -m i386:x86-64 反汇编,使用 Unicorn Engine 模拟(安全地挂钩系统调用),或使用 Capstone 进行编程式反汇编。寻找 XOR 解码器存根。参见 scripts-and-obfuscation.md。
vol3 windows.malfind 检测注入的代码(PAGE_EXECUTE_READWRITE 且无映射文件)。windows.pstree 显示可疑的父子进程关系。使用 yarascan.YaraScan 扫描内存。参见 scripts-and-obfuscation.md。
strings malware | grep -E '[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}'
tshark -r capture.pcap -Y "dns.qry.name" -T fields -e dns.qry.name | sort -u
每周安装量
536
代码仓库
GitHub 星标
664
首次出现
2026年2月1日
安全审计
安装于
codex525
opencode524
github-copilot511
gemini-cli510
amp509
kimi-cli508
Quick reference for malware analysis CTF challenges. Each technique has a one-liner here; see supporting files for full details with code.
eval/bash with echo to print underlying code; extract base64/hex blobs and analyze with file. See scripts-and-obfuscation.md.eval with console.log, decode unescape(), atob(), String.fromCharCode().-enc base64, replace IEX with output. See scripts-and-obfuscation.md.call targets. See scripts-and-obfuscation.md.tshark -r file.pcap -Y "tcp.stream eq X" -T fields -e tcp.payload
Look for C2 on unusual ports. Extract IPs/domains with strings | grep. See c2-and-protocols.md.
tcprewrite, add RSA key for TLS decryption, find RC4 key in binary. See c2-and-protocols.md.0x637c777b S-box; ChaCha20: expand 32-byte k; TEA/XTEA: 0x9E3779B9; RC4: sequential S-box init. See c2-and-protocols.md.peframe malware.exe # Quick triage
pe-sieve # Runtime analysis
pestudio # Static analysis (Windows)
See pe-and-dotnet.md.
VM detection (CPUID, MAC prefix, registry, disk size), timing evasion (sleep/RDTSC sandbox detection), API hashing (ROR13/DJB2/CRC32 + hashdb lookup), process injection (hollowing, APC, CreateRemoteThread), environment checks. See scripts-and-obfuscation.md.
pyinstxtractor.py to extract, PyArmor-Unpacker for protected code. See pe-and-dotnet.md.getUpdates and getFile APIs. See c2-and-protocols.md.ar -x package.deb && tar -xf control.tar.xz # Check postinst scripts
See scripts-and-obfuscation.md.
Write YARA rules to match byte patterns, strings, and regex against files or memory dumps. Detect XOR loops ({31 ?? 80 ?? ?? 4? 75}), base64 blobs, encoded PowerShell. Use yarac to compile for faster scanning. See scripts-and-obfuscation.md.
Disassemble with objdump -b binary -m i386:x86-64, emulate with Unicorn Engine (hook syscalls safely), or use Capstone for programmatic disassembly. Look for XOR decoder stubs. See scripts-and-obfuscation.md.
vol3 windows.malfind detects injected code (PAGE_EXECUTE_READWRITE without mapped file). windows.pstree reveals suspicious parent-child relationships. YARA scan memory with yarascan.YaraScan. See scripts-and-obfuscation.md.
strings malware | grep -E '[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}'
tshark -r capture.pcap -Y "dns.qry.name" -T fields -e dns.qry.name | sort -u
Weekly Installs
536
Repository
GitHub Stars
664
First Seen
Feb 1, 2026
Security Audits
Gen Agent Trust HubWarnSocketWarnSnykFail
Installed on
codex525
opencode524
github-copilot511
gemini-cli510
amp509
kimi-cli508
DOCX文件创建、编辑与分析完整指南 - 使用docx-js、Pandoc和Python脚本
41,800 周安装