Tool
CLI
Malware Analysis

flare-floss

by mandiant

3.8Kstars
498forks
126watchers
Updated 4 months ago
About

FLOSS automatically extracts and deobfuscates all strings from malware binaries using advanced static analysis techniques.

FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.

Primary Use Case

FLOSS is primarily used by malware analysts and security researchers to enhance static analysis by revealing obfuscated strings within malware binaries that traditional tools like strings.exe miss. It helps uncover hidden configuration data, domains, and other artifacts critical for understanding malware behavior.

Key Features
  • Automatically extracts static, stack, tight, and decoded strings from binaries
  • Supports extraction of language-specific strings from Go and Rust compiled programs
  • Enhances traditional strings extraction by revealing obfuscated and runtime-constructed strings
  • Provides additional Python scripts for integration with tools like Binary Ninja and IDA Pro
  • Offers command-line interface with flexible options to filter string types
  • Open source with active releases and CI testing
  • Licensed under Apache 2.0

Installation

  • Download the standalone executable from the releases page: https://github.com/mandiant/flare-floss/releases
  • Refer to the installation documentation for detailed installation methods: doc/installation.md

Usage

>_ floss malware.exe

Extract obfuscated strings from a malware binary.

>_ floss --only stack tight -- suspicious.exe

Extract only stack and tight strings from the specified binary.

>_ floss --no static -- backdoor.exe

Extract all strings except static strings from the binary.

>_ floss -h

Display core help and usage information.

>_ floss -H

Display all supported arguments and detailed usage.

Security Frameworks
Discovery
Collection
Defense Evasion
Execution
Credential Access
Usage Insights
  • Integrate FLOSS into automated malware triage pipelines to accelerate static analysis and reduce manual effort.
  • Combine FLOSS output with dynamic analysis tools to correlate runtime behavior with extracted strings for comprehensive malware profiling.
  • Use FLOSS in purple team exercises to simulate adversary obfuscation techniques and improve detection capabilities.
  • Leverage FLOSS’s language-specific string extraction to enhance analysis of Go and Rust malware samples increasingly seen in the wild.
  • Incorporate FLOSS into continuous integration (CI) workflows for security teams developing detection signatures or threat intelligence.

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about flare-floss. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

This tool hasn't been indexed yet. Request indexing to enable AI chat.

Admin will review your request within 24 hours

Security Profile
Red Team70%
Blue Team60%
Purple Team80%
Details
LicenseApache License 2.0
LanguagePython
Open Issues495
Topics
malware
deobfuscation
strings
flare
malware-analysis
gsoc-2025