New Update 4n4lDetector 2.7

Hello, good afternoon, I have been working hard on this project to bring it to an online environment. It may be interesting for those users who have doubts about downloading the application to their computer. It also includes many improvements in its detection methods, optimizations, automatic creation of Yara rules and even a query API.

https://pescan.io

Greetings!
 
  • Like
Reactions: harlan4096
Hello, good afternoon, I have been working hard on this project to bring it to an online environment. It may be interesting for those users who have doubts about downloading the application to their computer. It also includes many improvements in its detection methods, optimizations, automatic creation of Yara rules and even a query API.

https://pescan.io

Greetings!
It is paid-only service?

If yes, then unfortunately on security forums you will not find more than perhaps one or two buyers. These places are visited by people that want free. As in free security and related software that they can play with (not games). There are some that will pay for security software if they just got to have it so they can see if it is the answer to all their 100% protection dreams.
 
@4n0nym0us your service seems partially free to use for analysis only with basic features?
Please can you explain to us more regarding Pricing Details

Pricing Details - Q1 2025​

Below is a breakdown of the available packages:

Number of ScansPricePrice per UseDetails
10 Scans€1.50€0.15Perfect for small-scale usage.
50 Scans€5.00€0.10Great for frequent analyses.
100 Scans€9.00€0.09Discounted for larger volumes of analysis.
200 Scans€16.00€0.08Best offer for regular users.
500 Scans€35.00€0.07Lowest price per use, ideal for heavy users.
 
@bazang I’m not here to explicitly look for buyers; if my goal were to make money, I’d be developing malware instead. My personal project continues to grow, and one of the most interesting paths I’ve always considered is the possibility of offering my tool as an online analysis platform. This approach allows users to centralize their analyses outside their own machines, which I believe is more convenient in many cases.

@silversurfer The ability to perform private analyses is essential, and I wouldn’t be able to maintain a high-quality service without offering this option at a modest price, which helps me keep the platform online. The main analysis, including all primary features, is completely free. Paid features provide additional insights, such as detailed information about export and import tables, the full content of extracted strings, extra file size for analysis, and the generation of complex, fully functional Yara rules.

API queries are also free, except for private analyses, which are linked to samples uploaded using codes purchased after payment. However, even these have no additional costs. For those curious about trying the tool with these features, trial keys for full analysis are available in the "Settings" section of 4n4lDetector. :geek:
 
@bazang I’m not here to explicitly look for buyers; if my goal were to make money, I’d be developing malware instead. My personal project continues to grow, and one of the most interesting paths I’ve always considered is the possibility of offering my tool as an online analysis platform. This approach allows users to centralize their analyses outside their own machines, which I believe is more convenient in many cases.
I never said you were doing it to make money.

I said you are not going to find buyers. People want free. Not paid.
 
I never said you were doing it to make money.

I said you are not going to find buyers. People want free. Not paid.

I think the paid part of this tool is closed to a very specific and small audience that works exceptionally with IOCs, so the most valuable analysis remains public. Also, this way I can continue improving my tool and the online option in turn gives more people the option to try it without having to download it. I just hope you enjoy it. 🍻
 
  • Like
Reactions: simmerskool
Free update for everyone! Without a doubt, this is the most stable and powerful version to date.

Download:
Release 4n4lDetector v3.1 · 4n0nym0us/4n4lDetector

[+] A new button with a coronavirus icon has been added to the main panel, redirecting the user to PEscan.io when clicked.
[+] Manual integration of all Zw functions with their descriptions, including detection of Call API By Name invocations.
[+] Significant improvements in the information gathering module via SQL queries, optimizing both performance and accuracy.
[+] Optimization of the detection and analysis process for duplicate sections in PE files.
[+] Adjustment in the RVA calculation for the Export Table, now based on its real offset.
[+] New controls implemented for the extraction of the Import Table, Export Table, and Resources.
[+] A preventive control has been added to avoid general overflow-related errors.
[+] SSL support updated to ensure compatibility with the VirusTotal API.
[+] The automatic download of the current message in the Settings section has been disabled; it now requires manual user action.
[+] Additional security checks added for the Reset and Updates buttons in Settings to prevent accidental execution.
[+] Redesign and improvement of report presentation, both in the main panel and HTML version, aimed at a better user experience.
[+] File access module revised to improve extraction of styled HTML content.
[+] Buffer handling optimized during analysis to enhance overall performance.
[+] Additional information included, such as the .NET version and a new flag indicating Any CPU support.
[+] Settings and Help forms now open centered relative to the main form.
[+] Updated rule dictionaries for Entry Point and custom "4n4l.Rules".
[+] Fixed a sporadic error in the file paths section.
[+] Added plain text format extraction for data retrieved from executable resources.
-> Reviewed detection of executables embedded within resources.
-> Text extraction from resources is now limited according to actual content size.
[+] Improved Intelligent Strings module with broader pattern coverage and detections.
-> Enhanced collection of serial numbers and IP addresses in the module.
Enjoy it, here’s to my hacker’s health! 👹
 
Last edited by a moderator:
  • Like
Reactions: harlan4096
You must have hit the "Strike through" button in "More option" in the editor.


No, I realized it too late. When I post the changelog here with the dash marks inside brackets that I use for the new version, it gets interpreted and the rest of the content is automatically struck through.

Cheers!
 
@4n0nym0us
hello man,
did you really worked with K. mitnick ? .... 🤓
Yes, I was lucky enough to work with him. I was developing Insanity Protector, and he needed to bypass antivirus software for some conferences. He contacted me via email, and eventually, we met in person. I spent several years helping him with some of his ideas he was a truly endearing person.

Best regards!
 
I bring you a major innovation in static malware analysis, along with highly optimized performance and stability. Both the Professional version and PEscan have been updated with the latest enhancements. This version will give my neurons 🧠 a break… and I know it will be your best ally for reversing and security incidents that, unfortunately, are ahead of us. The integrated Flow Anomalies module works seamlessly with the [Show Offsets] tool, allowing you to track the execution flow of different code fragments and locate their strings. Enjoy it! 🤗

Changelog v3.2
  • Compatibility with the achievement medal system and unlocking of functionalities from the previous version.
  • Fixed an issue that caused duplicate section counts in non-executable files.
  • Inclusion of form state controls during analysis.
  • Complete review of the heuristic and email modules, now enabled by default.
  • If the Options form was open during analysis, it will remain visible until completion.
  • Manual string search limited to 100 characters.
  • Redistribution and minor adjustments in the payload module detections.
  • Review of the decimal-to-hexadecimal and hexadecimal-to-decimal offset conversion routine.
  • Optimization of the Intelligent Strings module, improving performance on large files.
  • Slight improvement in SQL query extraction.
  • Update and optimization of the file description extraction module:
    • Language and CodePage fields are now included in all descriptions.
  • Inclusion of the Flow Anomalies module, responsible for static code flow checks:
    • Identification of indirect calls in executables.
    • Detection of suspicious jump sequences (JMP and conditional), indicating possible obfuscation or packing.
    • Detection of instructions related to shellcodes and payloads.
    • Detection of NOP and breakpoint (BP) sequences.
    • Extraction of Overlay in hexadecimal and character format.
    • Verification of junk code in Entry Points.
Download: 4n4lDetector v3.2
 
I bring you a major innovation in static malware analysis, along with highly optimized performance and stability. Both the Professional version and PEscan have been updated with the latest enhancements. This version will give my neurons 🧠 a break… and I know it will be your best ally for reversing and security incidents that, unfortunately, are ahead of us. The integrated Flow Anomalies module works seamlessly with the [Show Offsets] tool, allowing you to track the execution flow of different code fragments and locate their strings. Enjoy it! 🤗

(...)

Hey! First of all, I really like what you’re doing with 4n4lDetector 🙌

For the next major release(s), I had a few ideas that might make your tool even stronger in terms of trust :

-------

1) Official handbook / educational guide — a structured manual (or short book) so people can learn PE basics and use 4n4lDetector step by step. I’d be happy to help draft/structure it (the GitHub docs are a bit inconsistent right now).

2) Integrated sandbox with hypervisor-based stealth — run samples in a disposable, lightweight VM launched directly from 4n4lDetector. Execution stays in isolated guest RAM, so the sample can’t touch the host OS or real temp folders; this also reduces your direct responsibility as the developer. Virtualization keeps the sample believing it’s on a normal OS while you monitor it “underneath,” and avoids kernel-patching approaches that Windows 11 blocks.
  • LTSC compatibility: Some Windows 11 Enterprise LTSC editions don’t include Windows Sandbox. Detect this at runtime and fall back to a Managed VM (e.g., Hyper-V): launch a disposable VM with networking disabled, map a read-only samples folder and a writable logs folder, and (optionally) attach a debugger inside the VM. Windows Sandbox is handy, but not a silver bullet — hence the managed fallback.
  • Note: certain builds of Sandboxie (SbieDrv.sys) can no longer load in kernel mode on Windows 11 when Memory Integrity (HVCI) is enabled (“A driver can’t load on this device”). That’s why sticking to Windows Sandbox or Hyper-V VMs keeps compatibility with modern Windows protections.
3) Debug Mode (inside the VM) — to stay safe while gaining deeper insights
  • Automatically attach WinDbg inside the VM; for driver analysis, support loading and debugging signed .sys drivers.
  • Provide a simple UI to set breakpoints on common APIs (file, registry, crypto, networking) and capture arguments/return values.
  • Keep networking disabled by default, and write outputs only to a mapped logs folder.
  • Optional presets (“Ransomware”, “Stealer”, etc.) that preconfigure typical API breakpoints.
Scope note: I’m focusing on driver-based threats, including legitimately signed drivers (BYOVD).
Even signed drivers — and those later revoked or listed on Microsoft’s Vulnerable Driver Blocklist — can slip past defenses in some configurations, which is why hardening (WDAC allow-listing, HVCI/Memory Integrity, Secure Boot) is non-negotiable. My role is to help legitimate drivers be allowed without weakening protections. I’ll work with vendors to ship HVCI-compliant, properly signed drivers (EV/attestation). If a known-good driver is blocked, I’ll open a case with Microsoft’s Hardware Dev Center to resolve a false block. Policies/blocklists can be conservative; I’ll push for a fix while keeping security intact.

Only for information - if you want to learn something useful :
Windows Hardening Benchmark Reference — Globally Recognized (CIS)
Official page (free CIS WorkBench account required):
CIS Microsoft Windows Desktop Benchmarks
Mirror for convenience (verify again the official version for updates):
https://rayasec.com/wp-content/uplo...ft_Windows_11_Enterprise_Benchmark_v4.0.0.pdf
Attribution: “Based on CIS Benchmarks © Center for Internet Security (CIS). Used in accordance with the CIS Free to Use Terms : CIS WorkBench / Terms of Use

4) Certificate & OCSP analysis – check the PE’s code-signing certificate and extract OCSP/CRL URLs. Flag valid/expired/revoked status and suspicious cases where malware abuses or bypasses code signing. This adds a PKI-aware trust layer to reports.

--------

For transparency: I’m not a developer; my background is in security auditing and law (mostly in Europe, and I’m also learning global cyber law). I’d describe myself as more “grey hat” than strictly ethical-only, but my focus here is educational and security-oriented — to help legitimate users learn, not to support criminal purposes who are not legitimate.

but it's ok we /you don’t have to do everything at once — starting with the educational handbook makes sense to me.

Why ?

After a lot of mismatched virtual discussions lately even with people who pretend to be implicitely expert, I’d prefer a step-by-step approach.

What do you think?

PS: If you (or anyone else) choose not to sell the book, I’m not asking for any payment. I’m offering my help because I take trust very seriously in my day-to-day work, and I used ChatGPT-5 to help me to make this encouragement to you clearly in English :cool:
 
Last edited:
Hey! First of all, I really like what you’re doing with 4n4lDetector 🙌

For the next major release(s), I had a few ideas that might make your tool even stronger in terms of trust :

-------

1) Official handbook / educational guide — a structured manual (or short book) so people can learn PE basics and use 4n4lDetector step by step. I’d be happy to help draft/structure it (the GitHub docs are a bit inconsistent right now).

2) Integrated sandbox with hypervisor-based stealth — run samples in a disposable, lightweight VM launched directly from 4n4lDetector. Execution stays in isolated guest RAM, so the sample can’t touch the host OS or real temp folders; this also reduces your direct responsibility as the developer. Virtualization keeps the sample believing it’s on a normal OS while you monitor it “underneath,” and avoids kernel-patching approaches that Windows 11 blocks.
  • LTSC compatibility: Some Windows 11 Enterprise LTSC editions don’t include Windows Sandbox. Detect this at runtime and fall back to a Managed VM (e.g., Hyper-V): launch a disposable VM with networking disabled, map a read-only samples folder and a writable logs folder, and (optionally) attach a debugger inside the VM. Windows Sandbox is handy, but not a silver bullet — hence the managed fallback.
  • Note: certain builds of Sandboxie (SbieDrv.sys) can no longer load in kernel mode on Windows 11 when Memory Integrity (HVCI) is enabled (“A driver can’t load on this device”). That’s why sticking to Windows Sandbox or Hyper-V VMs keeps compatibility with modern Windows protections.
3) Debug Mode (inside the VM) — to stay safe while gaining deeper insights
  • Automatically attach WinDbg inside the VM; for driver analysis, support loading and debugging signed .sys drivers.
  • Provide a simple UI to set breakpoints on common APIs (file, registry, crypto, networking) and capture arguments/return values.
  • Keep networking disabled by default, and write outputs only to a mapped logs folder.
  • Optional presets (“Ransomware”, “Stealer”, etc.) that preconfigure typical API breakpoints.
Scope note: I’m focusing on driver-based threats, including legitimately signed drivers (BYOVD).
Even signed drivers — and those later revoked or listed on Microsoft’s Vulnerable Driver Blocklist — can slip past defenses in some configurations, which is why hardening (WDAC allow-listing, HVCI/Memory Integrity, Secure Boot) is non-negotiable. My role is to help legitimate drivers be allowed without weakening protections. I’ll work with vendors to ship HVCI-compliant, properly signed drivers (EV/attestation). If a known-good driver is blocked, I’ll open a case with Microsoft’s Hardware Dev Center to resolve a false block. Policies/blocklists can be conservative; I’ll push for a fix while keeping security intact.

Only for information - if you want to learn something useful :



4) Certificate & OCSP analysis – check the PE’s code-signing certificate and extract OCSP/CRL URLs. Flag valid/expired/revoked status and suspicious cases where malware abuses or bypasses code signing. This adds a PKI-aware trust layer to reports.

--------

For transparency: I’m not a developer; my background is in security auditing and law (mostly in Europe, and I’m also learning global cyber law). I’d describe myself as more “grey hat” than strictly ethical-only, but my focus here is educational and security-oriented — to help legitimate users learn, not to support criminal purposes who are not legitimate.

but it's ok we /you don’t have to do everything at once — starting with the educational handbook makes sense to me.

Why ?

After a lot of mismatched virtual discussions lately even with people who pretend to be implicitely expert, I’d prefer a step-by-step approach.

What do you think?

PS: If you (or anyone else) choose not to sell the book, I’m not asking for any payment. I’m offering my help because I take trust very seriously in my day-to-day work, and I used ChatGPT-5 to help me to make this encouragement to you clearly in English :cool:


Hey! Thanks a lot for taking the time to share your ideas 🙏

Regarding point 1, I’m currently preparing some slides that should help explain the tool in detail — this will support many people who have questions. On the other hand, I’d be more than happy if someone wrote a full usage guide, because honestly, between work, developing the free and professional versions, working on PESCAN, and being a singer 😅, I just don’t have enough hours in the day.

About points 2 and 3, they focus on running the sample, but while early versions of 4n4lDetector included that aspect, it’s not really part of the tool’s idea. Here we only do static analysis.

Finally, point 4 is already partially implemented. Currently, 4n4lDetector checks the certificate status — whether it’s valid or not — and even if the file has been tampered with.

Really appreciate your suggestions and your willingness to help!
 
Creativity has no limits. I’ve been developing this personal project for nearly 11 years now, and I still haven’t found anyone crazier than me. This version 4n4lDetector v3.3 fixes every issue that previous versions might have had, bringing an unprecedented level of versatility to static malware analysis tools on Windows.

It includes new configuration options for analyzing execution flow, TLS Callbacks, junk code detection found in shellcodes, among many other ideas that now work together in perfect stability. It features the best IOC extractor, offset search, and integrated assembly code inspection all in one.

If you really want to unleash the full potential of this tool, make sure to explore the dropdown options under “Show Offsets”, because that’s where the magic happens it gives meaning to every extraction you obtain.

I hope you share it, enjoy it, and learn from it.

Changelog v3.3
  • Fixed a rare bug that could show the spinning hacker logo after completing the first analysis.
  • Added extraction of the IAT disk address in the Information section.
  • “Show Offsets” notifications now display information about the offset location when pressing DUMP or Disassemble.
  • Added overflow controls in external signature modules.
  • Revised section count handling for PE files with corrupted headers.
  • Adjusted Subsystem and MajorOSVersion identifiers in PE files.
  • Added MinorOSVersion field to the Information analysis.
  • Reviewed the function for counting duplicate sections in PE headers.
  • Completely restructured the SQL extraction module now much more powerful.
  • Reviewed the File Access execution extraction section.
  • Improved name detection in Export Table carving.
  • The options form now remains visible during analysis if it was open. (REVISION2)
  • Fixed a rare bug affecting the Finder’s UNICODE string search.
  • Slightly increased detections in Intelligent String section.
    • Added exclusive string cleaning for Golang-compiled binaries.
  • Reviewed the File Access module.
    • Maximized Unicode string extraction capability.
    • Improved ASCII cleaning to reduce Golang compiler false positives.
  • Reviewed the Sections module.
    • Added entropy and Chi² calculations for file sections.
    • Included full flag descriptions for all sections.
    • Unnamed sections now appear as unnamed.
  • Rebalanced the Flow Anomalies module.
    • Added padding and header detection for fragments between sections.
    • Included reading of TLS Callbacks.
    • Improved detection speed for shellcode and payload instructions.
    • Adjusted opcode interpretation with ModR/M and SIB to differentiate simple Displacement form from complex ModRM/SIB parsed, maintaining backward compatibility.
    • Junk code detection at entry points now applies to the entire PE file.
    • Section field detection is now explicitly tied to disk offsets.
    • The heuristic module now includes the [cnf] shortcut to open [Settings].
    • Extended x64 instruction translation support.
  • Added a new “Indirect Call/Jump” heuristic options section in [Settings] for indirect call and jump control.
    • Allows setting the code size to analyze (Decimal, 1,000–100,000 bytes).
    • Init Offset defines the starting analysis point, storable in decimal or hexadecimal.
    • CALL [static], JMP [static], CALL [reg], and JMP [reg] can be toggled individually.
    • “Indirect Call/Jump” configurations are automatically saved and loaded at startup, and can be deleted from the Config files section.

Download: Release 4n4lDetector v3.3 · 4n0nym0us/4n4lDetector
 
Creativity has no limits. I’ve been developing this personal project for nearly 11 years now, and I still haven’t found anyone crazier than me. This version 4n4lDetector v3.3 fixes every issue that previous versions might have had, bringing an unprecedented level of versatility to static malware analysis tools on Windows.
have you compared it to @Trident's Orion? If not, please do and give us some feedback... :unsure:
 
  • Like
Reactions: Trident
I hope you have a wonderful Three Kings’ Night. With great care, I bring you the new version of my tool:
Releases · 4n0nym0us/4n4lDetector

Changelog v3.4:
  • Optimization of the string cleaner, improving overall analysis speed.
  • Security review of the File Access execution extraction section.
  • Fixed a bug that could affect reading sections from the DIE library.
  • Improved handling of errors related to the number of corrupted sections.
  • Enhanced error handling when opening malformed files.
  • Replaced some RVAs with “N/A” where necessary.
  • Filled detection of empty or out-of-range resource fragments with “N/A”.
  • Fixed duplication of IPs found in the IP Addresses module.
  • Increased detection of multiple TLS callbacks, 32/64-bit support, pointer/indirection support, controlled heuristics, and complete RVA, VA, and section information.
  • The string search functionality has been reviewed and optimized from the “Strings” button in the right panel.
  • Speed optimization and security control for Intelligent Strings.
  • Improved buffer cleanup used in exported function carving.
  • Optimization for ASCII and NullByte character counting in the “Entropy/recount” section.
  • Added a general optimization review and new features to the Flow Anomalies module:
    • Added new detection of anomalous executable sections to the heuristic section.
    • Added new detection of Exception Hooks to the heuristic section.
    • Reduced the minimum extraction in the indirect jumps and calls section to 100.
  • Highlighting with search functionality and a color scale based on criticality:
    • Yellow: Important but non-critical findings; serve as warnings.
    • Orange: Potential anomalies or suspicious behavior requiring investigation.
    • Red: Evidence of malicious activity; requires priority review and in-depth analysis.
2026-01-05-20-00.png
 

You may also like...