SandboxAPI Logo

SandboxAPI

0
Free
Visit Website

A minimal, consistent API for building integrations with malware sandboxes. This library currently supports the following sandbox systems: * Cuckoo Sandbox * Falcon Sandbox (Formerly VxStream) * FireEye AX Series * Hatching Triage * Joe Sandbox * MetaDefender Sandbox * VMRay Analyzer * WildFire Sandbox It provides at least the following methods for each sandbox: * is_available(): Check if the sandbox is operable and reachable; returns a boolean * analyze(handle, filename): Submit a file for analysis; returns an item_id * check(item_id): Check if analysis has completed for a file; returns a boolean * report(item_id, report_format='json'): Retrieve the report for a submitted file * score(report): Parse out and return an integer score from the report object Some sandbox classes may have additional methods implemented. See inline documentation for more details. Note that the value returned from the score method may be on the range 0-10, or 0-100, depending on the sandbox in question, so you should refer to the specific sandbox's documentation when interpreting this value.

FEATURES

ALTERNATIVES

A native Python cross-version decompiler and fragment decompiler.

Generates a YARA rule to match basic blocks of the current function in IDA Pro

Binary analysis and management framework for organizing malware and exploit samples.

A tool for identifying sensitive secrets in public GitHub repositories

A yara module for searching strings inside zip files

TeamTNT is modifying its malicious shell scripts after they were made public by security researchers.

Debugger and .NET assembly editor with advanced debugging features.

Java decompiler GUI tool for Procyon under Apache License.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved