cuckoosandbox / cuckoo
Cuckoo Sandbox is an automated dynamic malware analysis system
☆5,636Updated 2 years ago
Alternatives and similar repositories for cuckoo:
Users that are interested in cuckoo are comparing it to the libraries listed below
- The pattern matching swiss knife☆8,632Updated 3 weeks ago
- Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.☆6,735Updated this week
- Repository of yara rules☆4,321Updated 11 months ago
- An advanced memory forensics framework☆7,589Updated last year
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆5,603Updated this week
- Arkime is an open source, large scale, full packet capturing, indexing, and database system.☆6,559Updated this week
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,087Updated 3 years ago
- Loki - Simple IOC and YARA Scanner☆3,495Updated 4 months ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,876Updated 2 months ago
- GRR Rapid Response: remote live forensics for incident response☆4,859Updated 3 weeks ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆7,053Updated last week
- A curated list of awesome YARA rules, tools, and people.☆3,730Updated last month
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,462Updated 2 weeks ago
- Open Source Vulnerability Management Platform☆5,300Updated last week
- Modern Honey Network☆2,448Updated 3 months ago
- The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file s…☆2,752Updated this week
- TheHive: a Scalable, Open Source and Free Security Incident Response Platform☆3,593Updated 2 years ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,130Updated 6 months ago
- OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, roo…☆4,665Updated 2 months ago
- YARA signature and IOC database for my scanners and tools☆2,576Updated this week
- Empire is a PowerShell and Python post-exploitation agent.☆7,568Updated 5 years ago
- A network sniffer that logs all DNS server replies for use in a passive DNS setup☆1,690Updated 9 months ago
- Malware Configuration And Payload Extraction☆2,268Updated this week
- Rekall Memory Forensic Framework☆1,946Updated 4 years ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,654Updated last week
- yarGen is a generator for YARA rules☆1,617Updated 9 months ago
- Various public documents, whitepapers and articles about APT campaigns☆3,556Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,513Updated 8 months ago
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,010Updated 2 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,624Updated 4 years ago