MITRECND / chopshopLinks
Protocol Analysis/Decoder Framework
☆496Updated 2 years ago
Alternatives and similar repositories for chopshop
Users that are interested in chopshop are comparing it to the libraries listed below
Sorting:
- Web interface for the Volatility Memory Forensics Framework☆259Updated 7 years ago
- A tool to retrieve malware directly from the source for security researchers.☆563Updated 8 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆195Updated 8 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆270Updated 4 years ago
- Web App for Volatility framework☆388Updated 3 months ago
- Modified edition of cuckoo☆270Updated 6 years ago
- Modified edition of cuckoo☆404Updated 7 years ago
- Automatic Yara Rule Generation☆333Updated 9 years ago
- 16,432 Free Yara rules created by☆390Updated 6 years ago
- Differential Analysis of Malware in Memory☆213Updated 8 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆468Updated 6 years ago
- ☆205Updated 2 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆398Updated 9 years ago
- Collaborative malware analysis framework☆377Updated 6 years ago
- Auto Installer Script for Cuckoo Sandbox☆164Updated 7 years ago
- Modular file scanning/analysis framework☆622Updated 6 years ago
- ☆174Updated 4 years ago
- File Scanning Framework☆294Updated 4 years ago
- IRMA is an asynchronous & customizable analysis system for suspicious files.☆274Updated 2 years ago
- An open source framework for enterprise level automated analysis.☆396Updated 3 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆155Updated 5 years ago
- CrowdStrike Feed Management System. CrowdFMS is a framework for automating collection and processing of samples from VirusTotal, by lever…☆130Updated 7 years ago
- Malicious HTTP traffic explorer☆723Updated 2 years ago
- ☆152Updated 6 years ago
- Malware static analysis framework☆180Updated 5 years ago
- CRITs Services Collection☆184Updated 4 years ago
- Honeypot Intelligence with Splunk☆255Updated 7 years ago
- Threat Intelligence APIs☆281Updated 2 years ago
- Script for automating Linux memory capture and analysis☆273Updated 5 years ago
- Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.☆509Updated last year