spender-sandbox / cuckoo-modifiedLinks
Modified edition of cuckoo
☆404Updated 7 years ago
Alternatives and similar repositories for cuckoo-modified
Users that are interested in cuckoo-modified are comparing it to the libraries listed below
Sorting:
- Modified edition of cuckoo☆270Updated 6 years ago
- Repository of modules and signatures contributed by the community☆330Updated 2 years ago
- Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.☆509Updated last year
- Automatic Yara Rule Generation☆333Updated 9 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆468Updated 6 years ago
- Protocol Analysis/Decoder Framework☆496Updated 2 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆270Updated 4 years ago
- A Tool for Automatic Analysis of Malware Behavior☆373Updated 6 years ago
- Malware Configuration And Payload Extraction☆758Updated 11 months ago
- Web interface for the Volatility Memory Forensics Framework☆259Updated 7 years ago
- A tool to retrieve malware directly from the source for security researchers.☆563Updated 8 years ago
- PEframe is a open source tool to perform static analysis on Portable Executable malware and malicious MS Office documents.☆616Updated 3 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆436Updated 2 years ago
- A YARA-integrated process denial framework for Windows☆396Updated 5 years ago
- ☆205Updated 2 years ago
- Auto Installer Script for Cuckoo Sandbox☆164Updated 7 years ago
- 16,432 Free Yara rules created by☆390Updated 6 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆195Updated 8 years ago
- YARA Rules I come across on the internet☆352Updated last year
- Cuckoo Sandbox Dockerfile☆330Updated 5 years ago
- DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted …☆336Updated 9 months ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆398Updated 9 years ago
- ☆152Updated 6 years ago
- IRMA is an asynchronous & customizable analysis system for suspicious files.☆274Updated 2 years ago
- File Scanning Framework☆294Updated 4 years ago
- Collaborative malware analysis framework☆377Updated 6 years ago
- ☆278Updated 2 years ago
- Modular file scanning/analysis framework☆622Updated 6 years ago
- Web App for Volatility framework☆388Updated 3 months ago
- Yara rules for malware families seen as part of targeted threats project☆141Updated 8 years ago