Naga is a next-generation malware analysis sandbox that combines deep network forensics, real-time visualization, and a modern analyst-centric design.
β‘ "Stop treating malware analysis like a batch job. Start treating it like a live investigation."
Unlike traditional sandboxes (Cuckoo, CAPE), Naga delivers live streaming of the entire detonation process.
Traditional sandboxes generate reports after execution.
Naga flips this model by enabling analysts to:
443/tcp)| Tool | Purpose |
|---|---|
| Suricata | Network intrusion detection |
| YARA | Malware signature detection |
| CAPA | Capability analysis |
| MITRE ATT&CK | Behavior mapping |
Timeline of network activity
Color-coded traffic:
DNS + certificate insights
Live updates:
β No polling β only push-based events
Frontend (Svelte)
β
β REST / WebSocket
βΌ
Backend (Go)
βββ VM Orchestration
βββ Network Capture
βββ Screen Capture
βββ Enrichment Engine
β
βΌ
QEMU/KVM Virtual Machines
| Component | Technology | Purpose |
|---|---|---|
| VM Hypervisor | QEMU/KVM + libvirt | Isolation |
| Backend | Go (Gorilla, NATS) | API & orchestration |
| Frontend | Svelte, D3, vis-network | UI |
| Network Capture | tcpdump, mitmproxy | Packet + TLS |
| Screen Recording | ffmpeg, VNC | Live stream |
| Detection | Suricata, YARA, CAPA | Analysis |
| Telemetry | Sysmon | System events |
| Database | PostgreSQL | Storage |
| Backend | NATS | Communication |
| Message Bus | Docker Compose | Deployment |
[14:32:01] status: VM ready
[14:32:05] process: powershell.exe (PID 2345)
[14:32:06] mitre: T1059 - Command Execution
[14:32:07] network: 185.x.x.x:443 (HTTPS decrypted)
[14:32:08] alert: Suspicious PowerShell activity
[14:32:10] status: Completed
| Resource | Minimum |
|---|---|
| CPU | 8+ cores |
| RAM | 32GB+ |
| Storage | 200GB SSD |
| Network | Isolated |
git clone https://github.com/yourusername/naga
cd naga
sudo ./scripts/setup-host.sh
docker-compose up -d
| Feature | Naga | Cuckoo | CAPE | Commercial |
|---|---|---|---|---|
| Live UI | β | β | β | β οΈ Partial |
| TLS Decryption | β | β | β | β |
| Process Tree | β | β οΈ Static | β οΈ Static | β |
| Screen Recording | β | β | β | β |
| Deployment | Easy | Hard | Hard | N/A |
| Cost | FREE | FREE | FREE | $$$ |
| Feature | Status |
|---|---|
| API Hooking | π‘ Planned |
| Memory Analysis | π‘ Planned |
| Multi-VM | π‘ Planned |
| YARA Editor | π‘ Planned |
| STIX Export | π‘ Planned |
| Cloud Support | π΅ Under Review |
Named after the mythical serpent that guards treasures.
π‘ Naga helps analysts uncover hidden malware behavior while resetting clean after each detonation.
Naga redefines malware sandboxing:
If you like this project: