Recruit-CSIRT / odoribaLinks
Malware Dynamic Analysis Platform enhanced Cuckoo Sandbox
☆24Updated 8 years ago
Alternatives and similar repositories for odoriba
Users that are interested in odoriba are comparing it to the libraries listed below
Sorting:
- R-CSIRT Linux Triage tool☆39Updated 7 years ago
- Simple high-interactive client honeypot☆25Updated 8 years ago
- Cuckoo Sandbox plugin for extracts configuration data of known malware☆135Updated 2 years ago
- Automated Memory Analysis (Black Hat Arsenal 2014)☆32Updated 11 years ago
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆107Updated 3 years ago
- Application for STIX v2.0 objects management and analysis☆27Updated 8 years ago
- This is a sample approach of data analysis in security scene.☆18Updated 7 years ago
- A Yara rule generator for finding related samples and hunting☆162Updated 3 years ago
- Command-line Interface for Binar.ly☆39Updated 9 years ago
- Scripts for dealing with various ek's☆69Updated 8 years ago
- Implementation of the DIMVA 2017 publication "Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps"☆69Updated 3 years ago
- Manage VT Alerts☆62Updated 9 years ago
- Analyzing Rig Exploit Kit☆50Updated 8 years ago
- Modified edition of cuckoo community modules☆50Updated 8 years ago
- Automation for VirusTotal☆31Updated 9 years ago
- Open Development projects for TekDefense☆78Updated 9 years ago
- Some IR notes☆73Updated 9 years ago
- Lazy Office Analyzer☆121Updated 8 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Updated 5 years ago
- ☆37Updated 8 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 9 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Updated 7 years ago
- Memory forensics of virtualization environments☆48Updated 11 years ago
- ☆19Updated 7 years ago
- ☆82Updated 9 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 9 years ago
- EXIST is a web application for aggregating and analyzing cyber threat intelligence.☆152Updated last month
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆45Updated 9 years ago
- Parse Windows Prefetch files: Supports XP - Windows 10 Prefetch files☆121Updated last year
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Updated 8 years ago