Malware analysis using Docker project
☆25Mar 3, 2016Updated 10 years ago
Alternatives and similar repositories for dockoo
Users that are interested in dockoo are comparing it to the libraries listed below
Sorting:
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Malware visualization on earth map☆41Jan 26, 2015Updated 11 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- Simple host-based permit-by-exception iptables generation script☆16Sep 5, 2020Updated 5 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Injected malicious code into legitimate andoid applications. Converted a keyboard app into a keylogger and an MP3 downloader into an imag…☆19Aug 8, 2014Updated 11 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- Ponmocup Indicators of Compromise☆11Feb 4, 2016Updated 10 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Jun 25, 2018Updated 7 years ago
- ☆28Apr 18, 2016Updated 9 years ago
- Mass Android app vulnerability analysis toolkit☆13Dec 6, 2016Updated 9 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- Dockerfiles for NSM tools☆84Apr 14, 2017Updated 8 years ago
- (Unofficial) Python API for https://malwr.com/☆62Oct 13, 2016Updated 9 years ago
- a Malware/Threat Analyst Desktop☆89Aug 25, 2015Updated 10 years ago
- Mass static malware analysis tool☆94Feb 13, 2022Updated 4 years ago
- Download all packet captures from http://malware-traffic-analysis.net/☆20Aug 14, 2014Updated 11 years ago
- Automatically exported from code.google.com/p/verify-sigs☆18Sep 2, 2016Updated 9 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆98Oct 21, 2014Updated 11 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Jun 24, 2014Updated 11 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- Naively estimate entropic probability☆38Nov 9, 2021Updated 4 years ago
- An Online Analysis System for Packed Android Malware☆107Jul 28, 2016Updated 9 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- "Whatsapp Discover" is a tool for getting phone numbers of devices using Whatsapp by real time sniffing from an interface (disabled in th…☆22Mar 17, 2014Updated 11 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Scan web server for known webshell names and responses☆50Sep 12, 2016Updated 9 years ago
- Rapid deployment of Windows environment (files, registry keys, mutex etc) to facilitate malware analysis☆40Mar 8, 2015Updated 10 years ago
- Shared yara rules☆30Mar 17, 2014Updated 11 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Nov 27, 2016Updated 9 years ago
- A warehouse for your malware☆136Nov 21, 2025Updated 3 months ago
- spectrum monitoring system for GSM providers☆44Jan 10, 2016Updated 10 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Dec 24, 2019Updated 6 years ago
- Tools for attacking cryptographic implementations.☆21Oct 27, 2016Updated 9 years ago
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27May 13, 2025Updated 9 months ago
- Searches various online resources to try and get as much info about an IP/domain as possible.☆100Jan 15, 2014Updated 12 years ago
- Bro-IDS scripts☆50Sep 12, 2016Updated 9 years ago