cuckoosandbox / cuckoomonLinks
DEPRECATED - replaced with "monitor"
☆122Updated 9 years ago
Alternatives and similar repositories for cuckoomon
Users that are interested in cuckoomon are comparing it to the libraries listed below
Sorting:
- Modified edition of cuckoomon☆49Updated 7 years ago
- zer0m0n driver for cuckoo sandbox☆88Updated 9 years ago
- ☆109Updated 8 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 9 years ago
- Modified edition of cuckoomon☆23Updated 5 years ago
- Offline debugger for malware's reverse engineering☆115Updated 10 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆150Updated 7 years ago
- Implementation of the DIMVA 2017 publication "Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps"☆69Updated 3 years ago
- ☆91Updated 8 years ago
- Security Research and Development Framework☆106Updated 9 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Updated 9 years ago
- Automatically exported from code.google.com/p/malware-lu☆55Updated 6 years ago
- Analysis PE file or Shellcode☆49Updated 9 years ago
- Bit9 + Carbon Black Threat Intelligence☆81Updated 9 years ago
- ☆82Updated 6 years ago
- Modified edition of cuckoo community modules☆32Updated 5 years ago
- IDATACO IDA Pro Plugin☆47Updated 9 years ago
- ransomware_begone☆42Updated 9 years ago
- Various Yara signatures (possibly to be included in a release later).☆86Updated 6 years ago
- ☆93Updated 10 years ago
- Some source code snippets In my development.☆27Updated 3 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 8 years ago
- ☆52Updated 8 years ago
- ☆52Updated 10 years ago
- Imports MSDN documentation into IDA Pro☆51Updated 13 years ago
- Ambush Host Intrusion Prevention System☆65Updated 11 years ago
- Identifying and Disrupting Crypto-Ransomware (and Destructive Malware) using handle heurustics☆55Updated 10 years ago
- Sublime Malware Research Tool☆66Updated 9 months ago
- ☆42Updated 6 years ago
- Run executables from the Windows registry☆16Updated 3 years ago