An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.
☆124Aug 10, 2015Updated 10 years ago
Alternatives and similar repositories for CuckooSploit
Users that are interested in CuckooSploit are comparing it to the libraries listed below
Sorting:
- Malicious HTTP traffic explorer☆724Mar 16, 2023Updated 2 years ago
- a Malware/Threat Analyst Desktop☆89Aug 25, 2015Updated 10 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- Modified edition of cuckoo☆272Sep 9, 2019Updated 6 years ago
- IDATACO IDA Pro Plugin☆46Jun 14, 2016Updated 9 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆170Jul 7, 2018Updated 7 years ago
- Malcom - Malware Communications Analyzer☆1,164Nov 29, 2017Updated 8 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Jun 19, 2020Updated 5 years ago
- Dynamic instrumentation tool for Adobe Flash Player built on Intel Pin☆148Aug 5, 2014Updated 11 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Updated this week
- zer0m0n driver for cuckoo sandbox☆87Jul 12, 2016Updated 9 years ago
- An Open Source Malware Analysis Pipeline System☆157Jun 1, 2021Updated 4 years ago
- Web interface for the Volatility Memory Forensics Framework☆260Nov 21, 2017Updated 8 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- C++ application that uses memory and code hooks to detect packers☆274Mar 5, 2018Updated 7 years ago
- CuckooDroid - Automated Android Malware Analysis with Cuckoo Sandbox.☆602Nov 7, 2020Updated 5 years ago
- A Tool to Unpack Self-Modifying Code using DynamoRIO☆140Apr 17, 2017Updated 8 years ago
- Modified edition of cuckoo☆406Nov 21, 2017Updated 8 years ago
- PyAna - Analyzing the Windows shellcode☆247Feb 16, 2016Updated 10 years ago
- Run IDA Pro disassembler in Docker containers for automating, scaling and distributing the use of IDAPython scripts.☆297Nov 23, 2017Updated 8 years ago
- Web App for Volatility framework☆390Jan 13, 2026Updated last month
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- A Tool for Automatic Analysis of Malware Behavior☆373May 8, 2019Updated 6 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆398May 20, 2016Updated 9 years ago
- Malware Analysis Tool using Function Level Fuzzy Hashing☆191Dec 19, 2015Updated 10 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆332Apr 19, 2017Updated 8 years ago
- An OS X analyzer for Cuckoo Sandbox project☆57Sep 1, 2015Updated 10 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38May 29, 2018Updated 7 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- A tool to detect and crash Cuckoo Sandbox☆297Jul 22, 2024Updated last year
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago
- Malware exploits☆553Aug 22, 2025Updated 6 months ago
- A CrackMe powered with a virtual machine.☆43Apr 13, 2015Updated 10 years ago
- map file generator for intel x86 binary based on flirt signature☆83May 2, 2016Updated 9 years ago
- Python Decoders for Common Remote Access Trojans☆1,116Jul 16, 2024Updated last year
- IRMA is an asynchronous & customizable analysis system for suspicious files.☆279Mar 1, 2023Updated 2 years ago