Protocol Analysis/Decoder Framework
☆497Dec 19, 2022Updated 3 years ago
Alternatives and similar repositories for chopshop
Users that are interested in chopshop are comparing it to the libraries listed below
Sorting:
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆98Oct 21, 2014Updated 11 years ago
- Malicious HTTP traffic explorer☆724Mar 16, 2023Updated 2 years ago
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago
- Pivotable Reverse WhoIs / PDNS Fusion with Registrant Tracking & Alerting plus API for automated queries (JSON/CSV/TXT)☆159Sep 20, 2021Updated 4 years ago
- Laika BOSS: Object Scanning System☆751Dec 16, 2024Updated last year
- Binary analysis and management framework☆1,557Jun 7, 2023Updated 2 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Mitre chopshop network decoder framework☆31Oct 13, 2025Updated 4 months ago
- CRITs - Collaborative Research Into Threats☆910Jul 29, 2019Updated 6 years ago
- Malcom - Malware Communications Analyzer☆1,164Nov 29, 2017Updated 8 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- Python Decoders for Common Remote Access Trojans☆1,116Jul 16, 2024Updated last year
- Dockerfiles for NSM tools☆84Apr 14, 2017Updated 8 years ago
- CRITs - Collaborative Research Into Threats☆21Mar 13, 2019Updated 6 years ago
- Python bindings to libhtp☆31Oct 13, 2020Updated 5 years ago
- FAME Automates Malware Evaluation☆929Dec 16, 2025Updated 2 months ago
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,083Dec 9, 2025Updated 2 months ago
- Web App for Volatility framework☆390Jan 13, 2026Updated last month
- Volatility Plugins☆22May 1, 2015Updated 10 years ago
- Differential Analysis of Malware in Memory☆216Apr 16, 2017Updated 8 years ago
- Artifact analysis tools by JPCERT/CC Analysis Center☆462Aug 14, 2025Updated 6 months ago
- Modified edition of cuckoo☆272Sep 9, 2019Updated 6 years ago
- A tool to retrieve malware directly from the source for security researchers.☆563Jul 27, 2017Updated 8 years ago
- Process HTTP Pcaps With YARA☆108Jul 29, 2013Updated 12 years ago
- Currently not updated for WMIEvent module...☆262Feb 23, 2016Updated 10 years ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,231Aug 7, 2025Updated 6 months ago
- Malware Configuration And Payload Extraction☆761Nov 22, 2024Updated last year
- A collection of sources of indicators of compromise.☆952May 8, 2025Updated 9 months ago
- DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted …☆340Feb 7, 2025Updated last year
- Bro scripts written by CrowdStrike Services☆150May 3, 2021Updated 4 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆1,118Jul 10, 2024Updated last year
- Collection of IOCs related to targeting of civil society☆189Nov 11, 2021Updated 4 years ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,428Nov 16, 2023Updated 2 years ago
- The Multiplatform Linux Sandbox☆265Jan 3, 2022Updated 4 years ago
- An Open Source Malware Analysis Pipeline System☆157Jun 1, 2021Updated 4 years ago
- Automater - IP URL and MD5 OSINT Analysis☆552Aug 13, 2024Updated last year
- An open source framework for enterprise level automated analysis.☆394Jun 27, 2022Updated 3 years ago
- Modified edition of cuckoo☆406Nov 21, 2017Updated 8 years ago