Tag Archives: Malware

CAPE – Malware Configuration And Payload Extraction

CAPE is a malware sandbox. It is derived from Cuckoo and is designed to automate the process of malware analysis with the goal of extracting payloads and configuration from malware.

Attack_monitor – Endpoint detection & Malware analysis software

Attack_monitor is Python application written to enhance security monitoring capabilities of Windows 7/2008 (and all later versions) workstations/servers and to automate dynamic analysis of malware.

Cuckoo Sandbox – Automated Malware Analysis Framework

Cuckoo Sandbox is an open source automated malware analysis system. It’s used to automatically run and analyze files and collect comprehensive analysis results that outline what the malware does while running inside an isolated operating system. Cuckoo Sandbox is an

URLextractor – OSINT Reconnaissance Tool

URLextractor is a tool that you can use to run an automated Information gathering and website reconnaissance against a targeted URL.

VolatilityBot – Automated Memory Analyzer

VolatilityBot is an automation tool for researchers cuts all the guesswork and manual tasks out of the binary extraction phase, or to help the investigator in the first steps of performing a memory analysis investigation.

VolDiff – Malware Memory Footprint Analysis based on Volatility

VolDiff is a Python script that leverages the Volatility framework to identify malware threats on Windows 7 memory images.

theZoo – A repository of live malwares

theZoo is a project created to make the possibility of malware analysis open and available to the public.