Cuckoo Sandbox is an automated dynamic malware analysis system
☆107May 22, 2020Updated 5 years ago
Alternatives and similar repositories for phoenix
Users that are interested in phoenix are comparing it to the libraries listed below
Sorting:
- Malware Configuration And Payload Extraction☆761Nov 22, 2024Updated last year
- Generate bulk YARA rules from YAML input☆22Feb 3, 2020Updated 6 years ago
- Utility to scrape pastebin's incoming feed for known malware techniques☆20Feb 4, 2020Updated 6 years ago
- FakeOpenSmtpRelay.py is a Python3 script simulating a working open SMTP relay☆13Mar 18, 2019Updated 6 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Apr 3, 2020Updated 5 years ago
- Home to the ActorTrackr source code☆24Jun 21, 2017Updated 8 years ago
- ☆38Aug 22, 2018Updated 7 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆76Jan 19, 2026Updated last month
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆35Jul 8, 2019Updated 6 years ago
- InvestigationPlaybookSpec☆71Sep 26, 2017Updated 8 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆505Oct 21, 2022Updated 3 years ago
- PowerShell script utilized to pull several forensic artifacts from a live Win7 and WinXP system without WINRM.☆51Jan 25, 2018Updated 8 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Jan 15, 2019Updated 7 years ago
- Public Maltego Transforms☆24May 24, 2017Updated 8 years ago
- An information security preparedness tool to do adversarial simulation.☆1,139Apr 1, 2019Updated 6 years ago
- An open source framework for enterprise level automated analysis.☆394Jun 27, 2022Updated 3 years ago
- Real-time, container-based file scanning at enterprise scale☆975Updated this week
- snake - a malware storage zoo☆217Jul 11, 2023Updated 2 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Nov 15, 2016Updated 9 years ago
- FAME Automates Malware Evaluation☆929Dec 16, 2025Updated 2 months ago
- Automated install scripts for Cuckoo sandbox☆38Dec 5, 2017Updated 8 years ago
- ☆98Oct 7, 2020Updated 5 years ago
- Python script to decode common encoded PowerShell scripts☆217Jun 13, 2018Updated 7 years ago
- Python script to automatically create sigma rules from The hive observables☆25Mar 17, 2019Updated 6 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Use DNS to hunt for threats including DGAs☆15Jan 4, 2016Updated 10 years ago
- Triage automation for suspect URLs☆13Jul 23, 2019Updated 6 years ago
- Online hash checker for Virustotal and other services☆846Mar 21, 2025Updated 11 months ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆156Dec 20, 2019Updated 6 years ago
- ☆154Dec 6, 2018Updated 7 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆18Oct 7, 2016Updated 9 years ago
- ☆14Mar 9, 2023Updated 2 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆127Sep 23, 2023Updated 2 years ago
- ☆142May 24, 2024Updated last year
- ☆715Oct 28, 2022Updated 3 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Mar 27, 2017Updated 8 years ago
- ☆18Jun 8, 2018Updated 7 years ago