Recruit-CSIRT / odoribaLinks
Malware Dynamic Analysis Platform enhanced Cuckoo Sandbox
☆24Updated 7 years ago
Alternatives and similar repositories for odoriba
Users that are interested in odoriba are comparing it to the libraries listed below
Sorting:
- Cuckoo Sandbox plugin for extracts configuration data of known malware☆135Updated last year
- Simple high-interactive client honeypot☆24Updated 7 years ago
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆108Updated 2 years ago
- Automated Memory Analysis (Black Hat Arsenal 2014)☆32Updated 11 years ago
- R-CSIRT Linux Triage tool☆39Updated 7 years ago
- Application for STIX v2.0 objects management and analysis☆27Updated 7 years ago
- Analyzing Rig Exploit Kit☆50Updated 8 years ago
- A Yara rule generator for finding related samples and hunting☆160Updated 2 years ago
- Automation for VirusTotal☆31Updated 9 years ago
- Python Malware Crawler for Zoos and Repositories☆108Updated 7 years ago
- Manage VT Alerts☆62Updated 8 years ago
- Command-line Interface for Binar.ly☆38Updated 8 years ago
- A collection of Volatility Framework plugins.☆27Updated 11 years ago
- Implementation of the DIMVA 2017 publication "Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps"☆69Updated 3 years ago
- Memory forensics of virtualization environments☆47Updated 10 years ago
- ☆37Updated 8 years ago
- This is a sample approach of data analysis in security scene.☆18Updated 6 years ago
- Open Development projects for TekDefense☆77Updated 8 years ago
- Volatility Plugins☆21Updated 10 years ago
- onigiri - remote malware triage script☆24Updated 9 years ago
- Scripts for dealing with various ek's☆69Updated 8 years ago
- ☆82Updated 9 years ago
- Various public documents, whitepapers and articles about APT campaigns☆55Updated 9 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆97Updated 10 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- Some IR notes☆73Updated 9 years ago
- Modified edition of cuckoo community modules☆50Updated 8 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 8 years ago
- EXIST is a web application for aggregating and analyzing cyber threat intelligence.☆152Updated 2 years ago