Next
Installer Unpacking and Recursive Analysis
Auto-detect and unpack the common installer formats (MSI, NSIS, Inno Setup, InstallShield, 7z self-extractors), then recursively run void8's analysis pipeline on every embedded PE. Closes the biggest current blind spot, which is that an installer wrapper's signature and entropy reveal almost nothing about what it actually contains. The verdict on the wrapper becomes a verdict on its payload.
Next
YARA Scanning
Bundle a curated YARA ruleset such as YARA-Forge or the Neo23x0 signature-base and run it against every scanned file plus any unpacked installer contents. Rule hits surface as a new signal class in the scoring engine, with rule names and tags shown in the report. The single biggest static-analysis upgrade short of writing custom detection logic.
Planned
IOC Extraction with Reputation Lookups
Pull printable strings from PE files, regex out URLs, IPs, domains, registry paths, and suspicious API names, then check the network indicators against URLhaus, AbuseIPDB, and OTX. Hits feed both the scoring engine and the AI analysis prompt, giving the model real binary content to reason about instead of just metadata.
Planned
Allowlist Export
After a CLEAN verdict, generate the rule artifact the analyst actually needs: an AppLocker publisher rule scoped to signer plus product plus version range, a Windows Defender Application Control policy fragment, or a Defender ASR exclusion. Closes the loop from "is this safe" to "here's the rule to deploy" and makes void8 useful as the front end of an allowlisting workflow rather than just an analysis bench.
Planned
Local Reputation Database
Promote the existing per-SHA-256 JSON reports into a real lookup. Every scan checks whether this signer, product, or hash has been seen before and how it was scored, so "signed by a publisher you trusted three times this month" becomes a scoring signal in its own right. Pairs with optional MalwareBazaar daily feed import for instant denylist hits without a VirusTotal round-trip.
Planned
Mark-of-the-Web Inspection
Read the Zone.Identifier alternate data stream on scanned files to surface where they came from: the originating URL, the security zone, and the referrer. A binary downloaded from a vendor site is a different risk profile than one extracted from an email attachment, even when everything else looks identical.
Planned
Native PE Introspection
Parse the PE header directly in the analysis pipeline to extract imports, per-section entropy, overlay presence, TLS callbacks, and resource types - the things PeStudio shows, surfaced inline in the void8 report. Suspicious imports like CreateRemoteThread, VirtualAllocEx, and WriteProcessMemory become real scoring signals instead of things only the AI prompt mentions in passing.
Planned
Automated Dynamic Analysis
One-click dynamic analysis that launches Process Monitor with pre-configured filters, executes the sample, waits a configurable duration, captures the results, diffs the Autoruns baseline, and appends everything to the static report. Correlates with INetSim network simulation for isolated environments.
Planned
macOS and Linux Versions
Platform-native analysis environments using equivalent tooling. macOS version targeting Mach-O binary analysis with codesign verification, while the Linux version covers ELF binaries with readelf and strace. Same browser-based frontend, same scoring model, same YARA and IOC pipelines, adapted for each platform's binary formats and signing mechanisms. Likely written in Go for cross-platform single-binary distribution.
Planned
Kasm Workspace Integration
Pre-built Kasm workspace image with void8 pre-installed. Upload files through Kasm's browser interface, analyze in the isolated workspace, and discard the session. Zero local footprint.