cuckoosandbox / cuckooLinks
Cuckoo Sandbox is an automated dynamic malware analysis system
☆5,858Updated 3 years ago
Alternatives and similar repositories for cuckoo
Users that are interested in cuckoo are comparing it to the libraries listed below
Sorting:
- The pattern matching swiss knife☆9,212Updated 2 weeks ago
- Repository of yara rules☆4,588Updated last year
- An advanced memory forensics framework☆7,888Updated 6 months ago
- Rekall Memory Forensic Framework☆1,986Updated 5 years ago
- Loki - Simple IOC and YARA Scanner☆3,685Updated last month
- The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file s…☆2,922Updated this week
- Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.☆7,249Updated this week
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆6,006Updated last week
- Modern Honey Network☆2,464Updated 11 months ago
- GRR Rapid Response: remote live forensics for incident response☆4,996Updated 5 months ago
- A curated list of awesome YARA rules, tools, and people.☆4,082Updated 8 months ago
- OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, roo…☆4,932Updated 10 months ago
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,105Updated 4 years ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,793Updated 2 weeks ago
- Binary analysis and management framework☆1,552Updated 2 years ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,032Updated 2 weeks ago
- A network sniffer that logs all DNS server replies for use in a passive DNS setup☆1,729Updated last year
- YARA signature and IOC database for my scanners and tools☆2,800Updated this week
- DEPRECATED - MozDef: Mozilla Enterprise Defense Platform☆2,172Updated 4 years ago
- Various public documents, whitepapers and articles about APT campaigns☆3,628Updated last year
- LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices…☆1,894Updated 2 weeks ago
- Arkime is an open source, large scale, full packet capturing, indexing, and database system.☆7,200Updated this week
- Malware Configuration And Payload Extraction☆2,817Updated this week
- Indicators of Compromises (IOC) of our various investigations☆1,880Updated last week
- Snort++☆3,167Updated 2 weeks ago
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,230Updated 5 months ago
- yarGen is a generator for YARA rules☆1,744Updated last month
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,831Updated 3 years ago
- VirusTotal Wanna Be - Now with 100% more Hipster☆1,696Updated 2 years ago
- Please no pull requests for this repository. Thanks!☆2,355Updated last week