cuckoosandbox / cuckoo
Cuckoo Sandbox is an automated dynamic malware analysis system
☆5,587Updated 2 years ago
Alternatives and similar repositories for cuckoo:
Users that are interested in cuckoo are comparing it to the libraries listed below
- The pattern matching swiss knife☆8,463Updated this week
- Repository of yara rules☆4,247Updated 9 months ago
- The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file s…☆2,676Updated this week
- Arkime is an open source, large scale, full packet capturing, indexing, and database system.☆6,462Updated this week
- Rekall Memory Forensic Framework☆1,932Updated 4 years ago
- Binary analysis and management framework☆1,543Updated last year
- An advanced memory forensics framework☆7,462Updated last year
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,376Updated this week
- GRR Rapid Response: remote live forensics for incident response☆4,823Updated last month
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,834Updated last month
- Modern Honey Network☆2,442Updated last month
- Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.☆6,579Updated this week
- OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, roo…☆4,559Updated last week
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆5,477Updated this week
- A curated list of awesome YARA rules, tools, and people.☆3,646Updated 2 months ago
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,084Updated 3 years ago
- A curated list of tools for incident response☆7,795Updated 6 months ago
- Loki - Simple IOC and YARA Scanner☆3,444Updated last month
- A network sniffer that logs all DNS server replies for use in a passive DNS setup☆1,681Updated 7 months ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,599Updated this week
- LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices…☆1,754Updated 3 months ago
- A curated list of Awesome Threat Intelligence resources☆8,332Updated 5 months ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,045Updated 3 months ago
- Volatility 3.0 development☆2,822Updated this week
- YARA signature and IOC database for my scanners and tools☆2,525Updated last month
- DEPRECATED - MozDef: Mozilla Enterprise Defense Platform☆2,166Updated 3 years ago
- yarGen is a generator for YARA rules☆1,586Updated 7 months ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,743Updated 2 years ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆6,779Updated this week
- TheHive: a Scalable, Open Source and Free Security Incident Response Platform☆3,504Updated 2 years ago