mirror of
https://github.com/mandiant/capa.git
synced 2026-03-12 21:23:12 -07:00
doc: add table comparing ways to consume capa output (#2874)
* doc: add table comparing ways to consume capa output Add a short table to usage.md for CLI, IDA, Ghidra, CAPE, and web. Fixes #2273 * doc: add links to each option in the ways-to-consume table Addresses reviewer feedback to provide a link to learn more for each consumption method (IDA Pro, Ghidra, CAPE, Web/capa Explorer). Refs #2273 * doc: add Binary Ninja to ways-to-consume table Fixes #2273
This commit is contained in:
committed by
GitHub
parent
9f781ec21b
commit
2e36f67e11
@@ -54,6 +54,7 @@
|
||||
|
||||
- doc: document that default output shows top-level matches only; -v/-vv show nested matches @devs6186 #1410
|
||||
- doc: fix typo in usage.md, add documentation links to README @devs6186 #2274
|
||||
- doc: add table comparing ways to consume capa output (CLI, IDA, Ghidra, dynamic sandbox, web) @devs6186 #2273
|
||||
- binja: add mypy config for top-level binaryninja module to fix mypy issues @devs6186 #2399
|
||||
- ci: deprecate macos-13 runner and use Python v3.13 for testing @mike-hunhoff #2777
|
||||
- ci: pin pip-audit action SHAs and update to v1.1.0 @kami922 #1131
|
||||
|
||||
11
doc/usage.md
11
doc/usage.md
@@ -2,6 +2,17 @@
|
||||
|
||||
See `capa -h` for all supported arguments and usage examples.
|
||||
|
||||
## Ways to consume capa output
|
||||
|
||||
| Method | Output / interface | Typical use |
|
||||
|--------|--------------------|-------------|
|
||||
| **CLI** | Text (default, `-v`, `-vv`), JSON (`-j`), or other formats | Scripting, CI, one-off analysis |
|
||||
| [**IDA Pro**](https://github.com/mandiant/capa/tree/master/capa/ida/plugin) | capa Explorer plugin inside IDA | Interactive analysis with jump-to-address |
|
||||
| [**Ghidra**](https://github.com/mandiant/capa/tree/master/capa/ghidra/plugin) | capa Explorer plugin inside Ghidra | Interactive analysis with Ghidra integration |
|
||||
| [**Binary Ninja**](https://github.com/mandiant/capa/tree/master/capa/features/extractors/binja) | capa run using Binary Ninja as the analysis backend | Interactive analysis with Binary Ninja integration |
|
||||
| [**Dynamic (Sandbox)**](https://www.mandiant.com/resources/blog/dynamic-capa-executable-behavior-cape-sandbox) | capa run on dynamic sandbox report (CAPE, VMRay, etc.) | Dynamic analysis of sandbox output |
|
||||
| [**Web (capa Explorer)**](https://mandiant.github.io/capa/explorer/) | Web UI (upload JSON or load from URL) | Sharing results, viewing from VirusTotal or similar |
|
||||
|
||||
## Default vs verbose output
|
||||
|
||||
By default, capa shows only *top-level* rule matches: capabilities that are not already implied by another displayed rule. For example, if a rule "persist via Run registry key" matches and it *contains* a match for "set registry value", the default output lists only "persist via Run registry key". This keeps the default output short while still reflecting all detected capabilities at the top level. Use **`-v`** to see all rule matches, including nested ones. Use **`-vv`** for an even more detailed view that shows how each rule matched.
|
||||
|
||||
Reference in New Issue
Block a user