Protocol Analysis/Decoder Framework
☆497Dec 19, 2022Updated 3 years ago
Alternatives and similar repositories for chopshop
Users that are interested in chopshop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆98Oct 21, 2014Updated 11 years ago
- Malicious HTTP traffic explorer☆723Mar 16, 2023Updated 3 years ago
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago
- Mitre chopshop network decoder framework☆31Oct 13, 2025Updated 5 months ago
- Pivotable Reverse WhoIs / PDNS Fusion with Registrant Tracking & Alerting plus API for automated queries (JSON/CSV/TXT)☆159Sep 20, 2021Updated 4 years ago
- CRITs - Collaborative Research Into Threats☆21Mar 13, 2019Updated 7 years ago
- Laika BOSS: Object Scanning System☆751Dec 16, 2024Updated last year
- Binary analysis and management framework☆1,556Jun 7, 2023Updated 2 years ago
- Python bindings to libhtp☆31Oct 13, 2020Updated 5 years ago
- Volatility Plugins☆22May 1, 2015Updated 10 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- CRITs - Collaborative Research Into Threats☆911Jul 29, 2019Updated 6 years ago
- Python Decoders for Common Remote Access Trojans☆1,117Jul 16, 2024Updated last year
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- Dockerfiles for NSM tools☆84Apr 14, 2017Updated 8 years ago
- Malcom - Malware Communications Analyzer☆1,165Nov 29, 2017Updated 8 years ago
- Simple NGram Fast Indexer & Searcher☆37Jan 6, 2023Updated 3 years ago
- DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted …☆340Feb 7, 2025Updated last year
- Process HTTP Pcaps With YARA☆108Jul 29, 2013Updated 12 years ago
- Web App for Volatility framework☆386Jan 13, 2026Updated 2 months ago
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- A tool to retrieve malware directly from the source for security researchers.☆563Jul 27, 2017Updated 8 years ago
- Artifact analysis tools by JPCERT/CC Analysis Center☆462Aug 14, 2025Updated 7 months ago
- Modified edition of cuckoo☆272Sep 9, 2019Updated 6 years ago
- Differential Analysis of Malware in Memory☆216Apr 16, 2017Updated 8 years ago
- Currently not updated for WMIEvent module...☆262Feb 23, 2016Updated 10 years ago
- An open source framework for enterprise level automated analysis.☆394Jun 27, 2022Updated 3 years ago
- FAME Automates Malware Evaluation☆931Dec 16, 2025Updated 3 months ago
- Modified edition of cuckoo☆407Nov 21, 2017Updated 8 years ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,096Dec 9, 2025Updated 3 months ago
- Malware Configuration And Payload Extraction☆762Nov 22, 2024Updated last year
- A collection of sources of indicators of compromise.☆957May 8, 2025Updated 10 months ago
- Bro scripts written by CrowdStrike Services☆150May 3, 2021Updated 4 years ago
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- Cyber Intel Management☆50Jan 25, 2018Updated 8 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Mar 14, 2019Updated 7 years ago
- The Multiplatform Linux Sandbox☆266Jan 3, 2022Updated 4 years ago
- Repository of yara rules☆4,730Apr 17, 2024Updated last year