Cuckoo running in a nested hypervisor
☆128May 11, 2020Updated 5 years ago
Alternatives and similar repositories for CuckooVM
Users that are interested in CuckooVM are comparing it to the libraries listed below
Sorting:
- Automatic deployment of Cuckoo Sandbox malware lab using Packer and Vagrant☆240Apr 19, 2023Updated 2 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆108Feb 12, 2023Updated 3 years ago
- SilkETW & SilkService☆40Aug 14, 2019Updated 6 years ago
- Sacara VM☆123Dec 17, 2019Updated 6 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- PeaceMaker Threat Detection is a Windows kernel-based application that detects advanced techniques used by malware.☆431May 22, 2020Updated 5 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 4 years ago
- Virtual Machine Introspection, Tracing & Debugging☆596Feb 22, 2022Updated 4 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Aug 17, 2019Updated 6 years ago
- An offensive Powershell console☆30Dec 5, 2015Updated 10 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Mar 17, 2020Updated 5 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆446Oct 26, 2022Updated 3 years ago
- Malware Configuration And Payload Extraction☆761Nov 22, 2024Updated last year
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 6 years ago
- buffer-overflow☆15Feb 2, 2022Updated 4 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- Open source pre-operation C2 server based on python and powershell☆762Jul 6, 2021Updated 4 years ago
- Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.☆903Feb 25, 2020Updated 6 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆169Jan 5, 2021Updated 5 years ago
- Mario & Luigi - Tools for sniffing Windows Named Pipes communication☆129Nov 15, 2016Updated 9 years ago
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆401Feb 27, 2024Updated 2 years ago
- ☆36Jan 11, 2023Updated 3 years ago
- C# Situational Awareness Script☆34Apr 26, 2019Updated 6 years ago
- ☆169Dec 8, 2022Updated 3 years ago
- ☆166Feb 13, 2020Updated 6 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Feb 25, 2019Updated 7 years ago
- All-in-one bundle of MISP, TheHive and Cortex☆169Sep 27, 2022Updated 3 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆723Dec 26, 2022Updated 3 years ago
- A fully functional DanderSpritz lab in 2 commands☆447May 16, 2019Updated 6 years ago
- DFIRTrack - The Incident Response Tracking Application☆532Jan 13, 2026Updated last month
- An open source swiss army knife for arbitrary communication over application protocols☆244Dec 10, 2020Updated 5 years ago
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 3 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Apr 23, 2020Updated 5 years ago
- Resolvn Threat Hunting Virtual Machine☆139Aug 16, 2019Updated 6 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Oct 23, 2019Updated 6 years ago
- Standardized Malware Analysis Tool☆56Mar 9, 2021Updated 4 years ago
- Windows Events Attack Samples☆2,515Jan 24, 2023Updated 3 years ago