Need help with CuckooSploit?
Click the “chat” button below for chat support from the developer who created it, or find similar developers for support.

About the developer

125 Stars 35 Forks GNU General Public License v3.0 5 Commits 1 Opened issues


An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.

Services available


Need anything else?

Contributors list

# 411,302
Visual ...
4 commits
# 142,018
Visual ...
1 commit


Contributed By Check Point Software Technologies LTD.

CuckooSploit is an environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.

The framework accepts URL or a PCAP file, and works at three levels:

Exploitation Process - Detecting the core components of the exploitation process (ROP chains, shellcodes, and heap sprays) for when exploitation takes place but fails to launch payload for several reasons, along with immediate successful post-exploitation phenomena (example, process creation).

Full Flow Emulation - Implementing the approach of full web emulation, rather than emulation of a single file at a time, since many exploits served by Exploit Kits do not work out of the web-page context (require configurations and/or arguments).

Web Flow Detection Redirection sequence chains, JavaScript obfuscations, evasion techniques.

By using full web emulation on different combinations of OS/browser/plugin version, CuckooSploit increases the rate of malicious URL detection and presents a reliable verdict and, in some cases, CVE identification.


CuckooSploit is built upon the Cuckoo Sandbox, so all the pre-requisites and configurations must be made according to the Cuckoo installation guide.

Important note

According to our experience, IE process might crash or cause all kinds of problems when being injected with cuckoomon.dll while Windows defender and Windows Firewall are on (especially with versions 10/11 of IE). So currently we recommend turning both off (in addition to turning the UAC off for the PCAP emulation).

For enabling PCAP emulation using CapTipper, see the following instructions:

  1. Install all prerequisites for Cuckoo Sandbox. We always used Ubuntu (both client and server) as nest and Windows XP/7 SP1 as guest machines (both x86/x64)
  2. A Windows 7 guest machine should have UAC disabled
  3. The Microsoft Loopback Adapter should be installed for the PCAP analysis package:
    1. Start -> CMD -> hdwwiz -> Next
    2. Install the hardware that I manually select from a list
    3. Network adapters
    4. Choose Microsoft as manufacturer and Microsoft Loopback Adapter as network adapter
    5. Next -> Next -> Finish

VM configuration for Javascript Hooking:

  1. Python should be installed (pre-requisite for Cuckoo anyway).
  2. Python.exe must be included in the PATH environment.
  3. Install mitmproxy (pip install mitmproxy)
  4. Install beautifulSoup (pip install beautifulsoup4)
  5. Configure proxy settings in Internet Options to on port 8888
  6. Add "<-loopback>" (without quotation marks) to the Exceptions (in the proxy configurations)
  7. Snapshot the VM


We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.