RRepoGEO

REPOGEO REPORT · LITE

kevoreilly/CAPEv2

Default branch master · commit dd36c30f · scanned 5/14/2026, 2:56:49 PM

GitHub: 3,193 stars · 568 forks

AI VISIBILITY SCORE
40 /100
Critical
Category recall
0 / 2
Not recommended in any query
Rule findings
2 pass · 0 warn · 0 fail
Objective metadata checks
AI knows your name
3 / 3
Direct prompts that named your repo
HOW TO READ THIS REPORT

Action plan is what to do next — copy-pasteable changes prioritized by impact. Category visibility is the real GEO test: when a user asks an AI a brand-free question that should surface kevoreilly/CAPEv2, does the AI actually recommend you — or your competitors? Objective checks verify the metadata signals AI engines weight first. Self-mention check detects whether AI even knows you exist by name.

Action plan — copy-paste fixes

3 prioritized changes generated by gemini-2.5-flash. Mark items done after you ship the fix.

OVERALL DIRECTION
  • highreadme#1
    Reposition README's opening to highlight automated unpacking and anti-analysis

    Why:

    CURRENT
    ## CAPE: Malware Configuration And Payload Extraction - Documentation
    
    ### CAPE is a malware sandbox.
    A sandbox is used to execute malicious files in an isolated environment
    whilst instrumenting their dynamic behaviour and collecting forensic artefacts.
    COPY-PASTE FIX
    ## CAPE: Automated Malware Unpacking, Configuration Extraction, and Advanced Sandbox Analysis
    
    CAPE is an advanced malware sandbox specifically designed for automated dynamic malware unpacking, configuration extraction, and defeating anti-analysis techniques. It executes malicious files in an isolated environment, instrumenting their behavior and collecting forensic artifacts to provide deep insights for security analysts and malware researchers.
  • mediumtopics#2
    Add more specific topics for automated analysis and anti-analysis

    Why:

    CURRENT
    cape, configs, debugging-tools, malware, malware-analysis, malware-research, reverse-engineering, sandbox, unpacking
    COPY-PASTE FIX
    cape, configs, debugging-tools, malware, malware-analysis, malware-research, reverse-engineering, sandbox, unpacking, automated-malware-analysis, anti-analysis, malware-unpacker, threat-intelligence
  • lowlicense#3
    Clarify the existing license in the README

    Why:

    COPY-PASTE FIX
    Add a section to your README, perhaps under a new 'License' heading, stating: 'CAPE is distributed under the terms specified in the `LICENSE` file. Please consult the `LICENSE` file for full details on the applicable terms and conditions.'

Category GEO backends resolved for this scan: google/gemini-2.5-flash, deepseek/deepseek-v4-flash

Category visibility — the real GEO test

Brand-free queries asked to google/gemini-2.5-flash. Did AI recommend you, or someone else?

Same questions for every model — switch tabs to compare answers and rankings.

Recall
0 / 2
0% of queries surface kevoreilly/CAPEv2
Avg rank
Lower is better. #1 = top recommendation.
Share of voice
0%
Of all named tools, what % are you?
Top rival
Hybrid Analysis
Recommended in 2 of 2 queries
COMPETITOR LEADERBOARD
  1. Hybrid Analysis · recommended 2×
  2. Cuckoo Sandbox · recommended 1×
  3. Any.Run · recommended 1×
  4. Flare-VM · recommended 1×
  5. VirtualBox · recommended 1×
  • CATEGORY QUERY
    How can I safely analyze the behavior of suspicious executables in an isolated environment?
    you: not recommended
    AI recommended (in order):
    1. Cuckoo Sandbox
    2. Any.Run
    3. Flare-VM
    4. VirtualBox
    5. VMware Workstation Pro
    6. Hybrid Analysis
    7. Joe Sandbox

    AI recommended 7 alternatives but never named kevoreilly/CAPEv2. This is the gap to close.

    Show full AI answer
  • CATEGORY QUERY
    What tools help with automated malware unpacking and configuration extraction for reverse engineering?
    you: not recommended
    AI recommended (in order):
    1. CAPA (mandiant/capa)
    2. Intezer Analyze
    3. ANY.RUN
    4. Hybrid Analysis
    5. Viper (viper-framework/viper)
    6. UnpacMe

    AI recommended 6 alternatives but never named kevoreilly/CAPEv2. This is the gap to close.

    Show full AI answer

Objective checks

Rule-based audits of metadata signals AI engines weight most.

  • Metadata completeness
    pass

  • README presence
    pass

Self-mention check

Does AI even know your repo exists when asked about it directly?

  • Compared to common alternatives in this category, what is the core differentiator of kevoreilly/CAPEv2?
    pass
    AI named kevoreilly/CAPEv2 explicitly

    AI answers can be confidently wrong. Read for accuracy: does it match your actual tech stack, audience, and differentiator?

  • If a team adopts kevoreilly/CAPEv2 in production, what risks or prerequisites should they evaluate first?
    pass
    AI named kevoreilly/CAPEv2 explicitly

    AI answers can be confidently wrong. Read for accuracy: does it match your actual tech stack, audience, and differentiator?

  • In one sentence, what problem does the repo kevoreilly/CAPEv2 solve, and who is the primary audience?
    pass
    AI named kevoreilly/CAPEv2 explicitly

    AI answers can be confidently wrong. Read for accuracy: does it match your actual tech stack, audience, and differentiator?

Embed your GEO score

Drop this badge into the README of kevoreilly/CAPEv2. It auto-updates whenever the report is rescanned and links back to the latest report — easy public proof that you care about AI discoverability.

RepoGEO badge previewLive preview
MARKDOWN (README)
[![RepoGEO](https://repogeo.com/badge/kevoreilly/CAPEv2.svg)](https://repogeo.com/en/r/kevoreilly/CAPEv2)
HTML
<a href="https://repogeo.com/en/r/kevoreilly/CAPEv2"><img src="https://repogeo.com/badge/kevoreilly/CAPEv2.svg" alt="RepoGEO" /></a>
Pro

Subscribe to Pro for deep diagnoses

kevoreilly/CAPEv2 — Lite scans stay free; this card itemizes Pro deep limits vs Lite.

  • Deep reports10 / month
  • Brand-free category queries5 vs 2 in Lite
  • Prioritized action items8 vs 3 in Lite