MITRECND / chopshop
Protocol Analysis/Decoder Framework
☆489Updated last year
Related projects ⓘ
Alternatives and complementary repositories for chopshop
- Web interface for the Volatility Memory Forensics Framework☆259Updated 7 years ago
- Differential Analysis of Malware in Memory☆209Updated 7 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆193Updated 7 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆263Updated 3 years ago
- 16,432 Free Yara rules created by☆380Updated 5 years ago
- Automatic Yara Rule Generation☆332Updated 8 years ago
- Modified edition of cuckoo☆271Updated 5 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆463Updated 5 years ago
- Web App for Volatility framework☆380Updated this week
- ☆200Updated last year
- Modified edition of cuckoo☆395Updated 7 years ago
- ☆150Updated 5 years ago
- DPS' Lightweight Investigation Notebook☆423Updated 10 months ago
- CRITs Services Collection☆183Updated 3 years ago
- ☆167Updated 3 years ago
- Django web interface for managing Yara rules☆190Updated 6 years ago
- Malicious HTTP traffic explorer☆711Updated last year
- Modular file scanning/analysis framework☆616Updated 5 years ago
- An open source framework for enterprise level automated analysis.☆393Updated 2 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆429Updated last year
- A tool to retrieve malware directly from the source for security researchers.☆562Updated 7 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆285Updated 7 years ago
- Honeynet Project generic authenticated datafeed protocol☆212Updated last year
- Auto Installer Script for Cuckoo Sandbox☆165Updated 6 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆389Updated 8 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆154Updated 4 years ago
- Collaborative malware analysis framework☆375Updated 5 years ago
- File Scanning Framework☆289Updated 3 years ago