A powerful, instrumentable, real-time malware analysis platform, software reverse-engineering suite & IDS.
A virtual machine on Windows 10 22H2 or higher, 64-bit.
Important
Blackbird performs kernel-level instrumentation and may affect system stability depending on configuration. Always use it within a controlled virtual machine environment and not on systems containing important data.
- Full local analysis interface for malware detonation, reverse engineering, and triage
- Kernel-backed capture for process, thread, image, handle, memory, registry, filesystem, network, ETW, and timing telemetry
- Target launch and attach workflows for EXE and DLL subjects, including suspended launch, deferred resume, and execution control
- SR71 usermode instrumentation with launch-gate readiness, hook-health reporting, stack capture, and hook-integrity diagnostics
- Usermode API telemetry for NT, module, and Winsock activity, with API call graphs, argument observation, caller attribution, and symbol resolution
- Memory attribution for allocation, protection, write, section-map, unmap, and thread-execution evidence
- Memory behavior detections for executable allocation, remote memory activity, repeated protection flips, high-entropy regions, and unpacking/packer indicators
- Integrated heuristics and detection views with process relations, child process tracking, handles, registry, file, network, ETW, COM, and performance panes
- Thread and thread-stack analyzers with observed hook stacks and fallback stack snapshots where available
- Rules Intel for local Sigma/YARA-style rules, including file, page, memory-sample, and process-memory YARA scans
- Automatic Signature Intel enrichment on launch, memory events, direct-syscall traits, page samples, and target-process scan triggers
- Session capture archives (
.bkcap) with detection export formats for JSON Lines, Splunk HEC JSON, Elastic ECS NDJSON, CEF, and CSV - Local diagnostics and preflight checks for controller, driver, hook DLL, hook ingest, ETW, service state, and runtime integrity
Community includes the shared local capture and detection pipeline. Enterprise adds BlackbirdVisor/hypervisor control, NetSvc/server orchestration, the full memory inspector and disassembly workbench, WFP callout support, and active bugcheck/crash-payload extensions.
Please use this project board to open issues & enhancements. This also loosely tracks live-development.
The public local-stack introduction, installation, architecture, security notes, and UI manual are provided here:
Session archives are stored as .bkcap (SQLite + LZ4). Detections can be exported as SIEM JSON Lines, Splunk HEC JSON, Elastic ECS NDJSON, CEF, or CSV. Detection reference scenarios are in DetectionExamples.exe.
You need Visual Studio 2022+ with Windows Driver Kit (WDK) and .NET (Desktop Development).
Clone Blackbird:
git clone https://github.com/8damon/Blackbird
Open the Blackbird.slnx file & select Release & build.
Note
Some instability or unexpected behavior may occur due to the low-level nature of the platform. This is expected during development.

