cuckoosandbox / cuckoomonLinks
DEPRECATED - replaced with "monitor"
☆122Updated 9 years ago
Alternatives and similar repositories for cuckoomon
Users that are interested in cuckoomon are comparing it to the libraries listed below
Sorting:
- zer0m0n driver for cuckoo sandbox☆88Updated 9 years ago
- ☆109Updated 8 years ago
- Modified edition of cuckoomon☆50Updated 7 years ago
- Modified edition of cuckoomon☆23Updated 6 years ago
- Implementation of the DIMVA 2017 publication "Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps"☆69Updated 3 years ago
- Offline debugger for malware's reverse engineering☆117Updated 10 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆150Updated 8 years ago
- Identifying and Disrupting Crypto-Ransomware (and Destructive Malware) using handle heurustics☆56Updated 10 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 9 years ago
- Modified edition of cuckoo community modules☆32Updated 6 years ago
- ☆95Updated 10 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Updated 5 years ago
- Security Research and Development Framework☆106Updated 10 years ago
- ☆91Updated 8 years ago
- Imports MSDN documentation into IDA Pro☆51Updated 13 years ago
- Various Yara signatures (possibly to be included in a release later).☆87Updated 6 years ago
- Automatically exported from code.google.com/p/malware-lu☆55Updated 6 years ago
- Modified edition of cuckoo community modules☆50Updated 8 years ago
- Sublime Malware Research Tool☆66Updated 11 months ago
- IDATACO IDA Pro Plugin☆47Updated 9 years ago
- ☆52Updated 9 years ago
- PyAna - Analyzing the Windows shellcode☆248Updated 9 years ago
- Run executables from the Windows registry☆16Updated 3 years ago
- ☆75Updated 8 years ago
- ransomware_begone☆42Updated 9 years ago
- Yet another Python library to read and write PE/PE+ files.☆78Updated 8 years ago
- ☆52Updated 10 years ago
- Ambush Host Intrusion Prevention System☆65Updated 12 years ago
- Bit9 + Carbon Black Threat Intelligence☆81Updated 9 years ago
- ☆82Updated 6 years ago