cuckoosandbox / dragonLinks
Dragon Sandbox
☆78Updated 12 years ago
Alternatives and similar repositories for dragon
Users that are interested in dragon are comparing it to the libraries listed below
Sorting:
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- A warehouse for your malware☆133Updated 12 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- VirusTotal tools☆91Updated 4 years ago
- Static and automated/dynamic malware analysis☆47Updated 9 years ago
- Just a collection of scripts☆40Updated 5 years ago
- general purpose and malware specific analysis tools☆102Updated 9 years ago
- Megatron - A System for Abuse- and Incident Handling☆44Updated 8 years ago
- PowerShell scripts for Hard Drive forensics and parsing Windows Artifacts☆56Updated 4 years ago
- Collection of scripts for different malware analysis tasks☆76Updated 6 years ago
- A Python library to interface with a cuckoo-modified instance☆22Updated 8 years ago
- A security tool for detecting suspicious PDF modifications commonly found in BEC☆41Updated 9 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- A honeypot for malware that propagates via USB storage devices☆100Updated 10 years ago
- Alienvault Labs Projects Random Stuff☆79Updated 11 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Updated 8 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- ☆68Updated 8 years ago
- Digital Forensics and Incident Response Wiki☆40Updated 11 years ago
- Replay HTTP and HTTPS requests from a PCAP based on TLS Master Secrets.☆95Updated 3 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆58Updated 10 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆48Updated 8 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- Ambush Host Intrusion Prevention System☆65Updated 12 years ago
- Memory forensics of virtualization environments☆47Updated 10 years ago
- r2yara - Module for Yara using radare2 information☆36Updated last year
- Automated memory forensics analysis☆33Updated 6 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Updated 10 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 11 years ago