Flamory provides the following integration abilities:
Flamory provides advanced bookmarking for Cuckoo Sandbox. It captures screen, selection, text on the page and other context. You can find this bookmark later using search by page content or looking through thumbnail list.
For best experience use Google Chrome browser with Flamory plugin installed.
Flamory helps you capture and store screenshots from Cuckoo Sandbox by pressing a single hotkey. It will be saved to a history, so you can continue doing your tasks without interruptions. Later, you can edit the screenshot: crop, resize, add labels and highlights. After that, you can paste the screenshot into any other document or e-mail message.
Cuckoo Sandbox is a modular, automated malware analysis system. Running from command-line on a Linux or Mac host, it uses python and virtualization (VirtualBox, QEMU-KVM, etc) to create an isolated Windows guest environment to safely and automatically run and analyze files to collect comprehensive file behavior analysis. These results outline what the malware does while running inside an isolated Windows operating system, including Win32 API calls, files created/deleted, memory dumps, network traffic trace, screenshots of execution behavior, and full memory dumps of virtual machines.
Malwr.com is a free, non-commercial, closed-source example of a running instance of Cuckoo Sandbox while also using VirusTotal (Google subsidiary) APIs and libraries to present the file analysis.
Supported Host Operating Systems: GNU/Linux (Debian/Ubuntu preferred), Mac OS X
Required Host Software: Python-2.7, Virtualization (VirtualBox, QEMU-KVM, etc)
Supported Virtualized Operating Systems: Windows XP Service Pack 3, Windows Vista, Windows 7
Cuckoo Sandbox is also known as Cuckoo. Integration level may vary depending on the application version and other factors. Make sure that user are using recent version of Cuckoo Sandbox. Please contact us if you have different integration experience.