Recruit-CSIRT / odoribaLinks
Malware Dynamic Analysis Platform enhanced Cuckoo Sandbox
☆24Updated 8 years ago
Alternatives and similar repositories for odoriba
Users that are interested in odoriba are comparing it to the libraries listed below
Sorting:
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆107Updated 3 years ago
- Cuckoo Sandbox plugin for extracts configuration data of known malware☆135Updated 2 years ago
- Simple high-interactive client honeypot☆25Updated 8 years ago
- R-CSIRT Linux Triage tool☆39Updated 7 years ago
- Automated Memory Analysis (Black Hat Arsenal 2014)☆32Updated 11 years ago
- Command-line Interface for Binar.ly☆39Updated 9 years ago
- Application for STIX v2.0 objects management and analysis☆27Updated 8 years ago
- A Yara rule generator for finding related samples and hunting☆162Updated 3 years ago
- Automation for VirusTotal☆31Updated 9 years ago
- Manage VT Alerts☆62Updated 9 years ago
- Analyzing Rig Exploit Kit☆49Updated 8 years ago
- Frontend for Codex Gigas☆21Updated 8 years ago
- CuckooMX is a project to automate analysis of files transmitted over SMTP (using the Cuckoo sandbox)☆41Updated 13 years ago
- Memory forensics of virtualization environments☆48Updated 11 years ago
- A tool to retrieve malware directly from the source for security researchers.☆39Updated 8 years ago
- Tool to decompress data from Windows 10 page files and memory dumps, that has been compressed by the Windows 10 memory manager.☆51Updated 6 years ago
- Volatility Plugins☆22Updated 10 years ago
- ☆37Updated 9 years ago
- a modified version base on Tracecorn☆20Updated 6 years ago
- onigiri - remote malware triage script☆24Updated 10 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 8 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 9 years ago
- EXIST is a web application for aggregating and analyzing cyber threat intelligence.☆152Updated 2 months ago
- This is a sample approach of data analysis in security scene.☆18Updated 7 years ago
- Fuzzy Hash calculated from import API of PE files☆91Updated 3 years ago
- A DFIR tool to collect artifacts on macOS☆56Updated 5 years ago
- Modified edition of cuckoo community modules☆50Updated 8 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Updated 8 years ago
- Scripts for dealing with various ek's☆69Updated 9 years ago
- ☆28Updated 8 years ago