Python API wrapper for the Joe Sandbox API.
☆69Jan 19, 2026Updated last month
Alternatives and similar repositories for jbxapi
Users that are interested in jbxapi are comparing it to the libraries listed below
Sorting:
- This Is Indian Country - Spring 2018 Instance☆12Apr 30, 2018Updated 7 years ago
- ☆10Dec 28, 2015Updated 10 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆19Jun 6, 2022Updated 3 years ago
- Registry Miner☆14Apr 10, 2018Updated 7 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Nov 5, 2019Updated 6 years ago
- SANS Slingshot Linux Distribution☆56Nov 2, 2020Updated 5 years ago
- CLBX file format☆20May 13, 2021Updated 4 years ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- Python client for p0f3 API☆15Jan 25, 2021Updated 5 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- Edited version of Lee Christensen's Get-NetworkConnection which includes timestamp for each network connection☆36Mar 14, 2018Updated 7 years ago
- ☆11Mar 12, 2021Updated 4 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- ☆11Aug 3, 2018Updated 7 years ago
- Analysis Correlation Engine☆26Sep 8, 2019Updated 6 years ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 2 years ago
- Tools for macOS Forensic Bootable media☆15May 20, 2020Updated 5 years ago
- Small App for reading from MHN's hpfeeds broker and writing splunk logs☆10Sep 30, 2019Updated 6 years ago
- Fuzzy Hash calculated from import API of PE files☆90Aug 26, 2022Updated 3 years ago
- Lite version of PDF X-RAY that uses no backend☆38Nov 11, 2011Updated 14 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- Backstage Parser☆33Jun 23, 2022Updated 3 years ago
- [ICFEM2017 / IEEE Transactions on Reliability] Learning Type for Binary / Type Learning for Binaries and its Applications☆15Sep 14, 2018Updated 7 years ago
- Writeup and scripts for the 2021 malwarebytes crackme☆11Nov 9, 2021Updated 4 years ago
- A lightweight C++/C AFF4 reader library☆14Feb 5, 2026Updated last month
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- Generate strong passwords using /dev/urandom 👻☆15Aug 7, 2017Updated 8 years ago
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆14Mar 4, 2019Updated 7 years ago
- Ekoparty's BlueSpace Keynote November 2021. Shoutout to @plugxor Muchas Gracias!!!☆13Jun 5, 2023Updated 2 years ago
- A collaborative, multi-platform, red teaming framework☆13Jan 19, 2020Updated 6 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆33Dec 11, 2016Updated 9 years ago
- ☆13Oct 12, 2019Updated 6 years ago
- Forensic cheatsheets for use with cheat☆15Dec 2, 2021Updated 4 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆18Sep 3, 2024Updated last year