A collection of software installation scripts for Windows that automates the setup and maintenance of a reverse engineering environment on a virtual machine.
FLARE-VM is a collection of PowerShell scripts that automates the installation and configuration of a reverse engineering toolset on a Windows virtual machine. It uses Chocolatey for package management and Boxstarter for environment automation, providing a consistent and repeatable setup for malware analysis and security research. The project addresses the tedious process of manually curating and maintaining analysis tools.
Security researchers, malware analysts, and reverse engineers who need a pre-configured Windows environment for analyzing malicious software and conducting security investigations.
Developers choose FLARE-VM because it drastically reduces the time and effort required to build a functional reverse engineering lab, ensures environment consistency, and offers customization through configuration files and package selection.
A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Leverages Chocolatey and Boxstarter to automatically download and configure dozens of reverse engineering tools like IDA Pro, saving hours of manual setup as described in the installation script.
Offers a GUI and XML configuration files to select specific packages and define environment variables, allowing tailored installations without modifying core scripts.
Script-based installation ensures consistent tooling across multiple VMs, ideal for teams or training scenarios, with support for custom taskbar layouts via XML files.
Supports registry edits, service configurations, and custom shortcuts through configuration files, enabling fine-grained environment tuning after the main installation.
Mandates disabling Windows Defender and updates, as specified in the requirements, leaving the VM vulnerable and unsuitable for secure or compliant environments.
Updates are best effort and not tested, and packages can fail due to external factors like download timeouts or changed URLs, as acknowledged in the Troubleshooting section.
Requires detailed VM preparation, including taking snapshots and disabling system features, which can be error-prone and time-consuming for users unfamiliar with Windows administration.