cuckoosandbox / cuckoomon
DEPRECATED - replaced with "monitor"
☆122Updated 9 years ago
Alternatives and similar repositories for cuckoomon:
Users that are interested in cuckoomon are comparing it to the libraries listed below
- zer0m0n driver for cuckoo sandbox☆87Updated 8 years ago
- Modified edition of cuckoomon☆49Updated 6 years ago
- Modified edition of cuckoomon☆23Updated 5 years ago
- ☆109Updated 7 years ago
- Modified edition of cuckoo community modules☆50Updated 7 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆154Updated 5 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆125Updated 9 years ago
- Modified edition of cuckoo community modules☆32Updated 5 years ago
- Various Yara signatures (possibly to be included in a release later).☆86Updated 5 years ago
- Static extraction of dridex malware configuration☆19Updated 9 years ago
- Alienvault Labs Projects Random Stuff☆79Updated 11 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆150Updated 7 years ago
- Malware Control Monitor☆88Updated 10 years ago
- Bit9 + Carbon Black Threat Intelligence☆82Updated 9 years ago
- Scripts for dealing with various ek's☆69Updated 8 years ago
- ☆52Updated 9 years ago
- IDATACO IDA Pro Plugin☆47Updated 8 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆53Updated 9 years ago
- The new Cuckoo Monitor.☆344Updated 8 months ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 9 years ago
- Dragon Sandbox☆78Updated 11 years ago
- ExeScan is the FREE console based tool to detect anomalies in PE (Portable Executable) files. It quickly scans given executable file and …☆21Updated 6 years ago
- Scalable Binary Data Extraction in Hadoop☆143Updated 10 years ago
- ☆44Updated 6 years ago
- ransomware_begone☆42Updated 9 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- Modified edition of cuckoo☆269Updated 5 years ago
- Implementation of the DIMVA 2017 publication "Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps"☆69Updated 3 years ago
- The CrowdDetox plugin for Hex-Rays automatically removes junk code and variables from Hex-Rays function decompilations.☆159Updated 3 years ago
- a collection of public yara rules☆26Updated 5 years ago