Shellcode analysis framework for Windows shellcode emulation and deobfuscation
Top 73.3% on sourcepulse
SHAREM is a comprehensive shellcode analysis framework designed for security researchers and malware analysts. It offers advanced emulation of over 20,000 WinAPIs and Windows syscalls, coupled with a custom disassembler that integrates emulation data for enhanced clarity, particularly for obfuscated shellcode.
How It Works
SHAREM employs a sophisticated emulation engine capable of deobfuscating encoded shellcode by executing it within a controlled environment. It logs and categorizes all WinAPI and syscall interactions, providing detailed structure information and identifying unreachable code. The disassembler leverages this emulation data to present a more accurate, deobfuscated view of the shellcode, significantly improving analysis efficiency.
Quick Start & Requirements
setup.py
via provided .bat
files (Windows) or linux_installer.sh
(Linux). Git is required for automated SSDeep installation on Windows.Highlighted Details
Maintenance & Community
Licensing & Compatibility
Limitations & Caveats
Documentation is sparse, with significant portions and features not yet documented. The "timeless debugging" feature is noted as being slow. Linux users must manually obtain and prepare Windows DLLs.
1 month ago
Inactive