analyzing-malware-behavior-with-cuckoo-sandbox
mukul975/Anthropic-Cybersecurity-Skills
Launch suspicious samples in Cuckoo Sandbox 3.x to capture process trees, file and registry changes, network traffic, and API calls, then produce behavioral reports for IOC extraction, YARA rule creation, and threat scoring so analysts can triage threats in isolation.