Advanced malware analysis engine with plugin support. Extend functionality to automate your analysis workflows and solve repetitive tasks efficiently.
A reverse engineering and malware analysis engine with support for plugins in Lua. Designed to automate analysis workflows, handle repetitive tasks, and provide flexible inspection of file formats.
local config = Configuration:new()
config:setup("example.conf")
config:load()
local name = config:get("plugin.name")
local logging = Logging:new()
logging:setup(config)
logging:load()
logging:info("Engine initialized")
local yara = Yara:new()
yara:load_rules(function ()
yara:set_rule_buff('rule Test { condition: true }', 'Test')
end)
yara:scan_fast_bytes("buffer", function(result)
if result.match_status == 1 then
logging:warn("Matched: " .. result.rule)
end
end)
Web.new(server, "/scan", function (req)
return Response.new(200, "OK")
end, HTTPMethod.Post)
local json = Json:new()
json:add("engine", "maldeclabs")
print(json:to_string())
Note
For complete examples, visit our documentation/examples
You can interact with your engine through the infinity-cli and explore various plugins developed by maldeclabs and the community via the infinity-plugins repository.
- infinity-cli: A command-line interface to seamlessly communicate with your engine and manage interactions with your system.
- infinity-plugins: A collection of plugins created by maldeclabs and the open-source community, extending the functionality of the engine with new features and integrations.
Feel free to check out these repositories for more information and contributions.
To develop the project and perform the build, the following steps are necessary verify documentation/build