01Extraction of strings and behavioral indicators like registry and network calls
02Identification of malware capabilities including persistence and obfuscation
03Automated generation of structured threat assessment and classification reports
0419 GitHub stars
05Decompilation of binary files into readable pseudo-C code
06Static analysis of PE headers, sections, and Import Address Tables (IAT)