MITRECND / chopshopLinks
Protocol Analysis/Decoder Framework
☆496Updated 3 years ago
Alternatives and similar repositories for chopshop
Users that are interested in chopshop are comparing it to the libraries listed below
Sorting:
- Web interface for the Volatility Memory Forensics Framework☆260Updated 8 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆273Updated 4 years ago
- 16,432 Free Yara rules created by☆390Updated 6 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆197Updated 8 years ago
- Modified edition of cuckoo☆405Updated 8 years ago
- A tool to retrieve malware directly from the source for security researchers.☆564Updated 8 years ago
- Web App for Volatility framework☆389Updated 5 months ago
- Modified edition of cuckoo☆271Updated 6 years ago
- Automatic Yara Rule Generation☆333Updated 9 years ago
- Differential Analysis of Malware in Memory☆214Updated 8 years ago
- File Scanning Framework☆295Updated 4 years ago
- CRITs Services Collection☆184Updated 4 years ago
- Modular file scanning/analysis framework☆624Updated 6 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆471Updated 6 years ago
- An open source framework for enterprise level automated analysis.☆396Updated 3 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆399Updated 9 years ago
- ☆206Updated 2 years ago
- IRMA is an asynchronous & customizable analysis system for suspicious files.☆275Updated 2 years ago
- ☆174Updated 4 years ago
- Collaborative malware analysis framework☆378Updated 6 years ago
- Auto Installer Script for Cuckoo Sandbox☆164Updated 7 years ago
- Script for automating Linux memory capture and analysis☆274Updated 5 years ago
- Repository of modules and signatures contributed by the community☆331Updated 2 years ago
- Threat Intelligence APIs☆282Updated 2 years ago
- ☆153Updated 7 years ago
- Malware static analysis framework☆182Updated 5 years ago
- Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.☆514Updated last year
- Honeynet Project generic authenticated datafeed protocol☆218Updated 2 years ago
- Honeypot Intelligence with Splunk☆255Updated 7 years ago
- A repository of tools and scripts related to malware analysis☆253Updated 9 years ago