Python API wrapper for the Joe Sandbox API.
☆69Jan 19, 2026Updated 2 months ago
Alternatives and similar repositories for jbxapi
Users that are interested in jbxapi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Dec 28, 2015Updated 10 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆19Jun 6, 2022Updated 3 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Dec 19, 2018Updated 7 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Nov 5, 2019Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- [ICFEM2017 / IEEE Transactions on Reliability] Learning Type for Binary / Type Learning for Binaries and its Applications☆15Sep 14, 2018Updated 7 years ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 3 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 8 years ago
- Public rules and samples for various automations through LimaCharlie.io☆14Dec 16, 2021Updated 4 years ago
- Writeup and scripts for the 2021 malwarebytes crackme☆11Nov 9, 2021Updated 4 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.☆171Mar 23, 2026Updated last week
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Reconstruct files from QR-code video data☆22Feb 15, 2018Updated 8 years ago
- Registry Miner☆14Apr 10, 2018Updated 7 years ago
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- Tools for assisting the reverse engineering of Qakbot☆11Jul 21, 2021Updated 4 years ago
- Fuzzy Hash calculated from import API of PE files☆90Aug 26, 2022Updated 3 years ago
- Win32 Python code for tracing malware activities on infected hosts☆26Jul 4, 2016Updated 9 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Analysis Correlation Engine☆26Sep 8, 2019Updated 6 years ago
- ☆22Jan 2, 2018Updated 8 years ago
- libdft for win☆51Jul 8, 2013Updated 12 years ago
- A protocol reverse engineer tool written in java.☆30Oct 14, 2016Updated 9 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- Static file analysis for PE files☆13Dec 4, 2020Updated 5 years ago
- ☆11Mar 12, 2021Updated 5 years ago
- Replay HTTP and HTTPS requests from a PCAP based on TLS Master Secrets.☆96Dec 8, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Parser for Sdba memory pool tags☆21Jul 16, 2021Updated 4 years ago
- IOC from articles, tweets for archives☆318Dec 12, 2023Updated 2 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Apr 10, 2024Updated last year
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆44Jul 23, 2024Updated last year
- Yara rules for detecting malware☆23Sep 9, 2025Updated 6 months ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆33Dec 11, 2016Updated 9 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago