An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.
☆124Aug 10, 2015Updated 10 years ago
Alternatives and similar repositories for CuckooSploit
Users that are interested in CuckooSploit are comparing it to the libraries listed below
Sorting:
- Malicious HTTP traffic explorer☆723Mar 16, 2023Updated 3 years ago
- Modified edition of cuckoo☆272Sep 9, 2019Updated 6 years ago
- a Malware/Threat Analyst Desktop☆89Aug 25, 2015Updated 10 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago
- IDATACO IDA Pro Plugin☆46Jun 14, 2016Updated 9 years ago
- An OS X analyzer for Cuckoo Sandbox project☆57Sep 1, 2015Updated 10 years ago
- Modified edition of cuckoo☆407Nov 21, 2017Updated 8 years ago
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆171Jul 7, 2018Updated 7 years ago
- zer0m0n driver for cuckoo sandbox☆87Jul 12, 2016Updated 9 years ago
- CuckooMX is a project to automate analysis of files transmitted over SMTP (using the Cuckoo sandbox)☆40Aug 2, 2012Updated 13 years ago
- Malcom - Malware Communications Analyzer☆1,165Nov 29, 2017Updated 8 years ago
- C++ application that uses memory and code hooks to detect packers☆275Mar 5, 2018Updated 8 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- CuckooDroid - Automated Android Malware Analysis with Cuckoo Sandbox.☆604Nov 7, 2020Updated 5 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Web interface for the Volatility Memory Forensics Framework☆259Nov 21, 2017Updated 8 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Jun 19, 2020Updated 5 years ago
- A Tool for Automatic Analysis of Malware Behavior☆373May 8, 2019Updated 6 years ago
- Dynamic instrumentation tool for Adobe Flash Player built on Intel Pin☆148Aug 5, 2014Updated 11 years ago
- Bit9 + Carbon Black Threat Intelligence☆81Mar 9, 2016Updated 10 years ago
- A tool to detect and crash Cuckoo Sandbox☆297Jul 22, 2024Updated last year
- An Open Source Malware Analysis Pipeline System☆157Jun 1, 2021Updated 4 years ago
- Web App for Volatility framework☆390Jan 13, 2026Updated 2 months ago
- Cuckoo Sandbox Dockerfile☆332Mar 18, 2020Updated 6 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆399May 20, 2016Updated 9 years ago
- PyAna - Analyzing the Windows shellcode☆247Feb 16, 2016Updated 10 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Patching Flash binary to stop Flash exploits and zero-days☆62Apr 18, 2017Updated 8 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- IRMA is an asynchronous & customizable analysis system for suspicious files.☆280Mar 1, 2023Updated 3 years ago
- A dumb set of scripts for building a cuckoo rig☆61Feb 26, 2017Updated 9 years ago
- Malware Analysis Tool using Function Level Fuzzy Hashing☆191Dec 19, 2015Updated 10 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- XSS Tunnel is a standard HTTP proxy which sits on an attacker’s system. XSS Shell is a powerful XSS backdoor, in XSS Shell one can inter…☆88Jan 27, 2015Updated 11 years ago
- Run IDA Pro disassembler in Docker containers for automating, scaling and distributing the use of IDAPython scripts.☆298Nov 23, 2017Updated 8 years ago
- Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.☆516May 14, 2024Updated last year
- Yet another Python library to read and write PE/PE+ files.☆78Oct 6, 2016Updated 9 years ago
- Search exploits in multiple exploit databases!☆85Oct 1, 2020Updated 5 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Mar 6, 2026Updated last week