An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.
☆124Aug 10, 2015Updated 10 years ago
Alternatives and similar repositories for CuckooSploit
Users that are interested in CuckooSploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malicious HTTP traffic explorer☆723Mar 16, 2023Updated 3 years ago
- Modified edition of cuckoo☆272Sep 9, 2019Updated 6 years ago
- a Malware/Threat Analyst Desktop☆89Aug 25, 2015Updated 10 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago
- IDATACO IDA Pro Plugin☆46Jun 14, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- An OS X analyzer for Cuckoo Sandbox project☆57Sep 1, 2015Updated 10 years ago
- Modified edition of cuckoo☆407Nov 21, 2017Updated 8 years ago
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆171Jul 7, 2018Updated 7 years ago
- zer0m0n driver for cuckoo sandbox☆86Jul 12, 2016Updated 9 years ago
- CuckooMX is a project to automate analysis of files transmitted over SMTP (using the Cuckoo sandbox)☆40Aug 2, 2012Updated 13 years ago
- Malcom - Malware Communications Analyzer☆1,169Nov 29, 2017Updated 8 years ago
- C++ application that uses memory and code hooks to detect packers☆276Mar 5, 2018Updated 8 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- CuckooDroid - Automated Android Malware Analysis with Cuckoo Sandbox.☆604Nov 7, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Web interface for the Volatility Memory Forensics Framework☆260Nov 21, 2017Updated 8 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Jun 19, 2020Updated 5 years ago
- A Tool for Automatic Analysis of Malware Behavior☆374May 8, 2019Updated 6 years ago
- Dynamic instrumentation tool for Adobe Flash Player built on Intel Pin☆149Aug 5, 2014Updated 11 years ago
- Bit9 + Carbon Black Threat Intelligence☆81Mar 9, 2016Updated 10 years ago
- A tool to detect and crash Cuckoo Sandbox☆297Jul 22, 2024Updated last year
- An Open Source Malware Analysis Pipeline System☆157Jun 1, 2021Updated 4 years ago
- Web App for Volatility framework☆386Jan 13, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Cuckoo Sandbox Dockerfile☆332Mar 18, 2020Updated 6 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆399May 20, 2016Updated 9 years ago
- PyAna - Analyzing the Windows shellcode☆247Feb 16, 2016Updated 10 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- IRMA is an asynchronous & customizable analysis system for suspicious files.☆280Mar 1, 2023Updated 3 years ago
- Patching Flash binary to stop Flash exploits and zero-days☆62Apr 18, 2017Updated 8 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- A dumb set of scripts for building a cuckoo rig☆61Feb 26, 2017Updated 9 years ago
- Malware Analysis Tool using Function Level Fuzzy Hashing☆192Dec 19, 2015Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- XSS Tunnel is a standard HTTP proxy which sits on an attacker’s system. XSS Shell is a powerful XSS backdoor, in XSS Shell one can inter…☆88Jan 27, 2015Updated 11 years ago
- Run IDA Pro disassembler in Docker containers for automating, scaling and distributing the use of IDAPython scripts.☆298Nov 23, 2017Updated 8 years ago
- Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.☆516May 14, 2024Updated last year
- Yet another Python library to read and write PE/PE+ files.☆78Oct 6, 2016Updated 9 years ago
- Search exploits in multiple exploit databases!☆85Oct 1, 2020Updated 5 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Mar 25, 2026Updated 2 weeks ago