{"id":25711,"date":"2022-11-07T18:25:37","date_gmt":"2022-11-07T18:25:37","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=25711"},"modified":"2023-04-10T13:30:54","modified_gmt":"2023-04-10T13:30:54","slug":"remnux-linux-toolkit-for-malware-analysis","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/endpoint\/remnux-linux-toolkit-for-malware-analysis\/","title":{"rendered":"REMnux: The Linux Toolkit for Reverse Engineering and Malware Analysis"},"content":{"rendered":"\n<p><a href=\"https:\/\/remnux.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">REMnux<\/a> is a free community distribution that ethical hackers, security researchers, and many other security pros can leverage to build their own labs and speed up <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\" target=\"_blank\" rel=\"noreferrer noopener\">malware analysis<\/a>.<\/p>\n\n\n\n<p>Whether you\u2019re new to these specialties or an experienced investigator, REMnux contains many helpful Debian packages and configurations to perform advanced tasks, such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Extracting IoCs (Indicators of Compromise)<\/li>\n\n\n\n<li>Disassembling\/decompiling binaries or windows executables (such as PE files)<\/li>\n\n\n\n<li>Decoding, deobfuscating, decyphering, and decrypting<\/li>\n\n\n\n<li>Tampering (such as Burp Suite, Thug) and other network analysis (such as Wireshark)<\/li>\n\n\n\n<li>Investigating malicious code in various platforms (such as Android) and languages (e.g., Python, <a href=\"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">PowerShell<\/a>, Java)<\/li>\n\n\n\n<li>Analyzing memory for code injections and other malicious activities<\/li>\n\n\n\n<li>Examining suspicious documents (such as PDFs, Microsoft Office, emails)<\/li>\n<\/ul>\n\n\n\n<p>We\u2019ll examine the pros and cons, but REMnux is definitely a great asset for those who want to focus on their work and skip the \u201cinstallation hell.\u201d<\/p>\n\n\n\n<p><em>See our tutorials on <\/em><a href=\"https:\/\/www.esecurityplanet.com\/products\/metasploit-framework-tutorial\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Metasploit<\/em><\/a><em>, <\/em><a href=\"https:\/\/www.esecurityplanet.com\/networks\/getting-started-with-burp-suite-pentest-tutorial\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Burp Suite<\/em><\/a><em> and <\/em><a href=\"https:\/\/www.esecurityplanet.com\/networks\/nmap-vulnerability-scanning-made-easy\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Nmap<\/em><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Getting Started with REMnux<\/strong><\/h2>\n\n\n\n<p>REMnux can be installed in a number of ways.<\/p>\n\n\n\n<p>The tool is available as a ready-to-use virtual machine (.ova), which means it can run everywhere (Windows, Mac, Linux), but you can also add it directly to an existing system based on Ubuntu 20.04 with <a href=\"https:\/\/docs.remnux.org\/install-distro\/add-to-existing-system#get-remnux-installer\" target=\"_blank\" rel=\"noreferrer noopener\">the REMnux installer<\/a> (less than 60 MB).<\/p>\n\n\n\n<p>Be careful if you have a next-gen Apple machine (m1++). At the time of writing, REMnux won&#8217;t run on an ARM processor such as Apple M1 or M2, as it&#8217;s based on an&nbsp;x86\/amd64 version of Ubuntu (source:&nbsp;<a href=\"https:\/\/docs.remnux.org\/install-distro\/get-virtual-appliance\" target=\"_blank\" rel=\"noreferrer noopener\">REMnux documentation<\/a>).<\/p>\n\n\n\n<p>I prefer using the virtual machine, as it provides an isolated environment and you can save snapshots, which is particularly convenient when you need to analyze <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">ransomware<\/a> and other sensitive binaries that can literally destroy your system.<\/p>\n\n\n\n<p>So get <a href=\"https:\/\/sourceforge.net\/projects\/remnux\/files\/ova-virtualbox\/remnux-v7-focal-virtualbox.ova\/download\" target=\"_blank\" rel=\"noreferrer noopener\">the OVA image<\/a> and import it into your favorite software, for example, Virtual Box or VMware.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What Problem Does REMnux Solve?<\/strong><\/h2>\n\n\n\n<p>As the founder and primary maintainer of REMnux, Lenny Zeltser likes to say:<\/p>\n\n\n\n<p>REMnux is for malware analysis as Kali is for <a href=\"https:\/\/www.esecurityplanet.com\/networks\/penetration-testing-phases\/\" target=\"_blank\" rel=\"noreferrer noopener\">penetration testing<\/a>.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/networks\/kali-linux-tutorial\/\">Kali Linux<\/a> actually contains forensic tools, but the distro is meant for pentesting, and you usually have to install additional resources to perform malware analysis and reverse engineering correctly.<\/p>\n\n\n\n<p>As these resources have their own dependencies, it\u2019s sometimes a bit difficult to make them work properly on a system that is not meant for that, which can be very time-consuming, and sometimes frustrating because of the multiple incompatibilities and dependency conflicts.<\/p>\n\n\n\n<p>See the <a href=\"https:\/\/www.esecurityplanet.com\/products\/open-source-distros-for-pentesting-and-forensics\/\" target=\"_blank\" rel=\"noreferrer noopener\">Best Open-Source Distributions for Pentesting and Forensics<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>REMnux Pros<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>It\u2019s totally free and its components are open source<\/li>\n\n\n\n<li>It\u2019s beginner friendly and well <a href=\"https:\/\/docs.remnux.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">documented<\/a><\/li>\n\n\n\n<li>It\u2019s easy to install (OVA, docker image, from scratch) and <a href=\"https:\/\/docs.remnux.org\/install-distro\/keep-the-distro-up-to-date\" target=\"_blank\" rel=\"noreferrer noopener\">update<\/a> (thanks to SaltStack technology)<\/li>\n\n\n\n<li>It\u2019s very popular among malware analysts and security professionals<\/li>\n\n\n\n<li>The set is very comprehensive, so it\u2019s unlikely you\u2019ll need any additional resources<\/li>\n\n\n\n<li>Tools are pre-packaged, tested, and pre-configured<\/li>\n\n\n\n<li>You can use REMnux tools without even installing them, using Docker and <a href=\"https:\/\/docs.remnux.org\/run-tools-in-containers\/remnux-containers\" target=\"_blank\" rel=\"noreferrer noopener\">REMnux containers<\/a><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Cons<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The latest big release, at the time of writing, is v7 in 2020<\/li>\n\n\n\n<li>REMnux is a collection of open-source packages, which on one hand is great, but comes with the same dependency and update issues<\/li>\n\n\n\n<li>The distro won\u2019t teach you how to master the various tools provided even if the documentation contains useful links and demos<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Why Use REMnux?<\/strong><\/h2>\n\n\n\n<p>REMnux is not just another Linux distro for ethical hacking or forensics. It contains pretty much everything you need to perform various analyses.<\/p>\n\n\n\n<p>The added value is the \u201cglue\u201d REMnux uses to make these hundreds of tools work together and remove the hassle of installing and configuring everything by yourself. Those are some compelling reasons to try it.<\/p>\n\n\n<div id=\"ta-campaign-widget-66d6eff0b0911-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6eff0b0911\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6eff0b0911\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6eff0b0911\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6eff0b0911\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6eff0b0911\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6eff0b0911\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>REMnux is a free community distribution that ethical hackers, security researchers, and many other security pros can leverage to build their own labs and speed up malware analysis. Whether you\u2019re new to these specialties or an experienced investigator, REMnux contains many helpful Debian packages and configurations to perform advanced tasks, such as: We\u2019ll examine the [&hellip;]<\/p>\n","protected":false},"author":267,"featured_media":25713,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[19],"tags":[5013,3790,31976,1146,3414,31708,730,5277],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[397,400,382,377,31775,392],"class_list":["post-25711","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-endpoint","tag-anti-malware","tag-cybersecurity","tag-forensics","tag-malware","tag-network-security","tag-pentesting","tag-security","tag-web-security","b2b_audience-awareness-and-consideration","b2b_product-anti-malware","b2b_product-antivirus","b2b_product-application-security-vulnerability-management","b2b_product-gateway-and-network-security","b2b_product-web-applications-security","b2b_product-web-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>REMnux: The Linux Toolkit for Reverse Engineering and Malware Analysis | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"REMnux contains almost everything you need to easily perform malware and other analyses. What&#039;s not to like&gt;\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/endpoint\/remnux-linux-toolkit-for-malware-analysis\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"REMnux: The Linux Toolkit for Reverse Engineering and Malware Analysis | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"REMnux contains almost everything you need to easily perform malware and other analyses. What&#039;s not to like&gt;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/endpoint\/remnux-linux-toolkit-for-malware-analysis\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-07T18:25:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-10T13:30:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/remnux-e1667845499299.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"570\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Julien Maury\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julien Maury\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/remnux-linux-toolkit-for-malware-analysis\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/remnux-linux-toolkit-for-malware-analysis\/\"},\"author\":{\"name\":\"Julien Maury\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\"},\"headline\":\"REMnux: The Linux Toolkit for Reverse Engineering and Malware Analysis\",\"datePublished\":\"2022-11-07T18:25:37+00:00\",\"dateModified\":\"2023-04-10T13:30:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/remnux-linux-toolkit-for-malware-analysis\/\"},\"wordCount\":628,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/remnux-linux-toolkit-for-malware-analysis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/remnux-e1667845499299.jpg\",\"keywords\":[\"anti-malware\",\"cybersecurity\",\"forensics\",\"malware\",\"network security\",\"pentesting\",\"security\",\"Web security\"],\"articleSection\":[\"Endpoint\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/remnux-linux-toolkit-for-malware-analysis\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/endpoint\/remnux-linux-toolkit-for-malware-analysis\/\",\"name\":\"REMnux: The Linux Toolkit for Reverse Engineering and Malware Analysis | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/remnux-linux-toolkit-for-malware-analysis\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/remnux-linux-toolkit-for-malware-analysis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/remnux-e1667845499299.jpg\",\"datePublished\":\"2022-11-07T18:25:37+00:00\",\"dateModified\":\"2023-04-10T13:30:54+00:00\",\"description\":\"REMnux contains almost everything you need to easily perform malware and other analyses. What's not to like>\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/remnux-linux-toolkit-for-malware-analysis\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/endpoint\/remnux-linux-toolkit-for-malware-analysis\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/remnux-linux-toolkit-for-malware-analysis\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/remnux-e1667845499299.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/remnux-e1667845499299.jpg\",\"width\":1000,\"height\":570,\"caption\":\"remnux\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/remnux-linux-toolkit-for-malware-analysis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"REMnux: The Linux Toolkit for Reverse Engineering and Malware Analysis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\",\"name\":\"Julien Maury\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"caption\":\"Julien Maury\"},\"description\":\"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jmaury\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"REMnux: The Linux Toolkit for Reverse Engineering and Malware Analysis | eSecurity Planet","description":"REMnux contains almost everything you need to easily perform malware and other analyses. What's not to like>","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/endpoint\/remnux-linux-toolkit-for-malware-analysis\/","og_locale":"en_US","og_type":"article","og_title":"REMnux: The Linux Toolkit for Reverse Engineering and Malware Analysis | eSecurity Planet","og_description":"REMnux contains almost everything you need to easily perform malware and other analyses. What's not to like>","og_url":"https:\/\/www.esecurityplanet.com\/endpoint\/remnux-linux-toolkit-for-malware-analysis\/","og_site_name":"eSecurity Planet","article_published_time":"2022-11-07T18:25:37+00:00","article_modified_time":"2023-04-10T13:30:54+00:00","og_image":[{"width":1000,"height":570,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/remnux-e1667845499299.jpg","type":"image\/jpeg"}],"author":"Julien Maury","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Julien Maury","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/remnux-linux-toolkit-for-malware-analysis\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/remnux-linux-toolkit-for-malware-analysis\/"},"author":{"name":"Julien Maury","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a"},"headline":"REMnux: The Linux Toolkit for Reverse Engineering and Malware Analysis","datePublished":"2022-11-07T18:25:37+00:00","dateModified":"2023-04-10T13:30:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/remnux-linux-toolkit-for-malware-analysis\/"},"wordCount":628,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/remnux-linux-toolkit-for-malware-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/remnux-e1667845499299.jpg","keywords":["anti-malware","cybersecurity","forensics","malware","network security","pentesting","security","Web security"],"articleSection":["Endpoint"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/remnux-linux-toolkit-for-malware-analysis\/","url":"https:\/\/www.esecurityplanet.com\/endpoint\/remnux-linux-toolkit-for-malware-analysis\/","name":"REMnux: The Linux Toolkit for Reverse Engineering and Malware Analysis | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/remnux-linux-toolkit-for-malware-analysis\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/remnux-linux-toolkit-for-malware-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/remnux-e1667845499299.jpg","datePublished":"2022-11-07T18:25:37+00:00","dateModified":"2023-04-10T13:30:54+00:00","description":"REMnux contains almost everything you need to easily perform malware and other analyses. What's not to like>","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/remnux-linux-toolkit-for-malware-analysis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/endpoint\/remnux-linux-toolkit-for-malware-analysis\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/remnux-linux-toolkit-for-malware-analysis\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/remnux-e1667845499299.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/remnux-e1667845499299.jpg","width":1000,"height":570,"caption":"remnux"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/remnux-linux-toolkit-for-malware-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"REMnux: The Linux Toolkit for Reverse Engineering and Malware Analysis"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a","name":"Julien Maury","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","caption":"Julien Maury"},"description":"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.","url":"https:\/\/www.esecurityplanet.com\/author\/jmaury\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25711"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/267"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=25711"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25711\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/25713"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=25711"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=25711"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=25711"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=25711"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=25711"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=25711"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}