We’ve designed Binee to bridge the barrier between static and dynamic analysis of real-world malware. This innovative emulator helps researchers extract run-time data from binaries at a cost, speed, and scale previously only possible with static analysis tools.
EQR is an open-source data analytics tool that gives data scientists in any industry the ability to execute large-scale queries on real-time data streams without writing code or batching transactions.
Our integrations with Splunk, including add-ons for Endpoint Standard and EDR, and the Phantom playbooks, allow administrators to forward events and notifications from Carbon Black’s solutions to Splunk for correlation and analysis and execute orchestration playbooks in Phantom.
The ThreatConnect connector for CB Response is a simple python-daemon that communicates with ThreatConnect’s API to retrieve Indicators of Compromise and format them as a Threat Intel Feed for CB Response. A similar connector to CB ThreatHunter will be available shortly.
Our integration with VMRay allows you to send binaries discovered in CB Response to VMRay for malware analysis.
We maintain a number of generic connectors and forwarders, including Yara Connector, Event Forwarder, and CB API for Python, to make integration with other platforms easy.