Anubis icon
Anubis icon

Anubis

 13 likes

Anubis is a tool for analyzing the behavior of Windows PE-executables with special focus on the analysis of malware. Execution of Anubis results in the generation of a report file that contains enough information to give a human user a very good impression about the purpose and...

License model

  • FreeProprietary

Application type

Country of Origin

  • AT flagAustria
  • European Union flagEU

Platforms

  • Online
Discontinued

The creators of Anubis icon Anubis and Wepawet icon Wepawet discontinued their services and created the company Lastline, Inc., whose products provide malware analysis

  No rating
13likes
0comments
0news articles

Features

Suggest and vote on features
No features, maybe you want to suggest one?

 Tags

Anubis News & Activities

Highlights All activities

Recent activities

No activities found.

Anubis information

  • Developed by

    AT flagVienna University of Technology, Secure Systems Lab
  • Licensing

    Proprietary and Free product.
  • Alternatives

    7 alternatives listed
  • Supported Languages

    • English

AlternativeTo Categories

Security & PrivacyNetwork & Admin

Our users have written 0 comments and reviews about Anubis, and it has gotten 13 likes

Anubis was added to AlternativeTo by Pablo_Mendoza on Mar 15, 2010 and this page was last updated Apr 18, 2016.
No comments or reviews, maybe you want to be first?
Post comment/review

What is Anubis?

Anubis is a tool for analyzing the behavior of Windows PE-executables with special focus on the analysis of malware. Execution of Anubis results in the generation of a report file that contains enough information to give a human user a very good impression about the purpose and the actions of the analyzed binary. The generated report includes detailed data about modifications made to the Windows registry or the file system, about interactions with the Windows Service Manager or other processes and of course it logs all generated network traffic. The analysis is based on running the binary in an emulated environment and watching i.e. analyzing its execution. The analysis focuses on the security-relevant aspects of a programs actions, which makes the analysis process easier and because the domain is more fine-grained it allows for more precise results. It is the ideal