-
It would be useful to have Python support in order to incorporate functionality from tools such as Cuckoo Sandbox, Volatility, and Yara. This would make it easier to use TSK for malware analysis relat…
-
i have results generated by cuckoo sandbox -Thanks developers- and i want to extract malware behavioral features ( i am doing research on Ransomware) . In cuckoo analysis htlm report contains many f…
-
## My Issue is:
I am running volatility windows exe on windows 7 machine. Whenever I try matching multiple YARA rules with against a memory dump file by running following command:
`>volatility_2…
-
I have some pdf malware examples, when the static.py to analysis it, it was lock by parsing pdf ( the function of _parse in static.py), it last for more than 900 seconds. Can you provide a solution to…
-
http://news.hitb.org/content/hitb2014kul-white-paper-irma-open-source-platform-incident-response-malware-analysis
-
Since the plugin manager can load plugins from any folder you tell it to, this could allow us to develop plugin packs - where the engine remains the same, but the plugins are focused on a specific are…
-
When uploading a file/malware sample MISP will automagically compute some hashes (md5, sha,...)
It would be nice to allow the user to choose which hashes he wants.
(some are selected by default and …
-
Hi there,
I was wondering if you're interested in including your extractors in [Assemblyline](https://cybercentrecanada.github.io/assemblyline4_docs/), our open-source malware analysis platform.
…
-
Hi,
I have noticed the malware execution isn't completely followed in cuckoo-2.0 missing behaviours due to it not identifying the execution path. Also this analysis while done with different versions…
-
I am a newbie in Android malware detection. I saw many ML-based tools are implemented based on Smali-IR. And I am also looking into the Soot for a more comprehensive analysis.
I have some questions …