Security builder & leader

REMnux Usage Tips for Malware Analysis on Linux

REMnux provides a curated Linux environment for malware analysis, with tools organized by task: Windows PE analysis, Linux binaries, documents, network interactions, memory forensics, and data gathering. Docker containers extend capabilities for tools like Thug honeyclient, RetDec decompiler, and Radare2.

REMnux Usage Tips for Malware Analysis on Linux - illustration

This cheat sheet outlines the tools and commands for analyzing malware using the REMnux v7 Linux distribution. To print, use the one-page PDF version; you can also edit the Word version for you own needs.

Get Started with REMnux

Operate Your REMnux System

TaskCommand
Shut down the systemshutdown
Reboot the systemreboot
Switch to a root shellsudo -s
Renew DHCP leaserenew-dhcp
See current IP addressmyip
Edit a text filecode file
View an image filefeh file
Start web serverhttpd start
Start SSH serversshd start

Analyze Windows Executables

Reverse-Engineer Linux Binaries

Investigate Other Forms of Malicious Code

Examine Suspicious Documents

Explore Network Interactions

Gather and Analyze Data

Other Analysis Tasks

Use Docker Containers for Analysis

Interact with Docker Images

TaskCommand
List local imagesdocker images
Update local imagedocker pull image
Delete local imagedocker rmi imageid
Delete unused resourcesdocker system prune
Open a shell inside a transient containerdocker run --rm -it image bash
Map a local TCP port 80 to container’s port 80docker run --rm -it -p 80:80 image bash
Map your current directory into containerdocker run --rm -it -v .:dirimage bash

This cheat sheet for REMnux is distributed according to the Creative Commons v3 “Attribution” License.

About the Author

Lenny Zeltser is a cybersecurity executive with deep technical roots, product management experience, and a business mindset. As CISO at Axonius, he leads the security and IT program, focusing on trust and growth. He is also a Faculty Fellow at SANS Institute and the creator of REMnux, a popular Linux toolkit for malware analysis. Lenny shares his perspectives on security leadership and technology at zeltser.com.

Learn more →