Jump to content
Advertising GIF
Advertising GIF

Recommended Posts

On 7/30/2025 at 12:52 PM, cambaz said:

Yes, the program is great. It's even better to see the owner here. Welcome.

Thank you very much! I really appreciate the warm welcome. If anyone encounters any issues with the application, please feel free to ask here I’ll be watching the thread and happy to help 😄

  • Like 1
2 hours ago, gsge said:

Usta virüs tespiti yapabilirmiyiz bununla

Yes, you can use this tool to detect malware; that is its primary purpose. However, it is designed for a technical audience with knowledge of reverse engineering. Best regards!

On 6/25/2025 at 2:29 PM, cambaz said:

detect4.png.2185fb4e14c1bc3ecfd24d9bbbd8ffa1.pngdetect3.png.cfa9039f0714cd2962b91b2b7976cae5.pngdetect2.png.536f53d95b849d6abe3c7080e5c93054.pngdetect1.png.0ebf8fd54d46d9331a68d3d01de9883c.png

🚀 Exclusive Reverse Engineering & Malware Hunting Toolkit

Released: 22 hours ago — Latest Version!

📝 About This Tool

4n4lDetector is a powerful and lightweight PE analysis scanner for Microsoft Windows executables, libraries, drivers, and memory dumps.

Designed to make malware detection easy and intuitive, the tool provides in-depth analysis of PE header structures, sections, strings, APIs, and anomalies — giving you the upper hand in detecting modern malware techniques.

It comes packed with smart heuristics, optimized detection engines, and actionable insights for reverse engineers and threat hunters.

👉 Simply drag & drop your samples — fast & intuitive!

Supported Architectures

32-bit: x86, 8086, ARMv7

64-bit: x64, x86-64, AMD64, ARMv8

TI & ET Extraction:

Alpha AXP, ARM (Thumb-2), ARM64

EFI Byte Code

Hitachi SH3, SH4, SH5

Intel i860, Itanium IA-64

MIPS R3000/R4000/FPU

x64, x86, x86-64

🎛️ UI Buttons Legend

🟢 Green: Action buttons (Open Files/Folders, Run Tools)

🔴 Red: Reset/Delete/Reconfigure

🟣 Purple: Online interactions

🌸 Pink: Navigation shortcuts

⌨️ Hotkeys

🔍 [A] Main Analysis

🌐 [W] HTML Report View

🔤 [S] Strings Viewer

🦠 [V] VirusTotal API Report

🧠 Detections & Features

🔎 PE Info & Structure

🛑 Unusual Entry Points & Code

📦 Packers / Crypters / Binders

🏗️ Compilations & Architectures

🧑‍💻 Suspicious Functions

🗝️ Registry Keys & File Access

🕵️ Anti-VM / Sandbox / Debug Detection

🌐 URL & IP Extractor

🗂️ Embedded Payloads

🛡️ AV Services Check

📄 Duplicate Sections & Rich Signature Analyzer

📬 Emails, SQL Queries, Malicious Resources

🐀 Config RAT Detection (Memory Dumps)

🧩 PE Carving & Exploit Detection

🧮 CheckSum / PE Integrity Verifications

🐍 Polymorphic Patterns

🆕 What's New in v3.1.0 🚀

Added Coronavirus Icon button redirecting to PEscan.io

Full integration of Zw functions & Call API By Name detections

Improved SQL info gathering (faster & more accurate)

Better handling of Duplicate Sections

RVA calculation adjustments for Export Table

New controls for Import/Export/Resources Extraction

Overflow protection & stability improvements

Updated SSL compatibility for VirusTotal API

Manual control for message downloads

Enhanced safety for Reset & Update buttons

Redesigned Report UI & HTML Reports

Improved Styled HTML Extraction

Optimized buffer handling & performance

Added .NET version & Any CPU flag detection

Centered Settings & Help windows

Updated 4n4l.Rules & Entry Point rules

Fixed sporadic file path errors

Improved extraction of executable resources

Enhanced Intelligent Strings Module (better serials & IP detection)

 

Hidden Content

  • Reply to this topic to see the hidden content.

 

thanks for this!

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...

Important Information

Terms of Use