cuckoosandbox / cuckooLinks
Cuckoo Sandbox is an automated dynamic malware analysis system
☆5,769Updated 3 years ago
Alternatives and similar repositories for cuckoo
Users that are interested in cuckoo are comparing it to the libraries listed below
Sorting:
- Repository of yara rules☆4,499Updated last year
- Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.☆7,087Updated this week
- The pattern matching swiss knife☆8,996Updated 2 weeks ago
- The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file s…☆2,853Updated this week
- Modern Honey Network☆2,462Updated 8 months ago
- GRR Rapid Response: remote live forensics for incident response☆4,946Updated 2 months ago
- An advanced memory forensics framework☆7,792Updated 3 months ago
- Rekall Memory Forensic Framework☆1,969Updated 4 years ago
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,101Updated 4 years ago
- Loki - Simple IOC and YARA Scanner☆3,625Updated this week
- OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, roo…☆4,804Updated 7 months ago
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆5,857Updated last week
- Arkime is an open source, large scale, full packet capturing, indexing, and database system.☆6,770Updated this week
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,982Updated last week
- Binary analysis and management framework☆1,551Updated 2 years ago
- A curated list of awesome YARA rules, tools, and people.☆3,937Updated 4 months ago
- A network sniffer that logs all DNS server replies for use in a passive DNS setup☆1,714Updated last year
- DEPRECATED - MozDef: Mozilla Enterprise Defense Platform☆2,171Updated 3 years ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,637Updated this week
- LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices…☆1,851Updated this week
- Various public documents, whitepapers and articles about APT campaigns☆3,604Updated last year
- YARA signature and IOC database for my scanners and tools☆2,721Updated this week
- Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by …☆2,775Updated last month
- TheHive: a Scalable, Open Source and Free Security Incident Response Platform☆3,794Updated 3 weeks ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,792Updated last month
- Indicators of Compromises (IOC) of our various investigations☆1,809Updated last week
- yarGen is a generator for YARA rules☆1,689Updated 4 months ago
- Super timeline all the things☆1,905Updated 3 weeks ago
- Snort++☆3,008Updated last week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,192Updated 2 weeks ago