ANSSI-FR / AnoMarkLinks
Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", afin de détecter des anomalies dans les évènements futurs
☆83Updated last year
Alternatives and similar repositories for AnoMark
Users that are interested in AnoMark are comparing it to the libraries listed below
Sorting:
- The backend server handling API requests and task management☆55Updated this week
- An open source platform to support analysts to organise their case and tasks☆123Updated last week
- ☆102Updated 2 months ago
- Forensic Artifact Collection Tool Matrix☆94Updated last year
- Powershell module for VMWare vSphere forensics☆158Updated last year
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆32Updated 3 years ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆108Updated last year
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (ext4, XFS) journals (not systemd-journald logs), gene…☆103Updated last month
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Updated last year
- Convert Sigma rules to SIEM queries, directly in your browser.☆109Updated 2 weeks ago
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆180Updated 8 months ago
- Website for ail-typo-squatting library☆71Updated 4 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 7 months ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97Updated 2 years ago
- Rules shared by the community from 100 Days of YARA 2024☆89Updated last year
- A collection of tips for using MISP.☆76Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Updated 2 years ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆169Updated 2 years ago
- ☆68Updated 2 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆86Updated last month
- BlackBerry Threat Research & Intelligence☆100Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- Guide journalisation Microsoft☆69Updated last week
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆117Updated 3 weeks ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Updated last year
- Detection Engineering with YARA☆87Updated 2 years ago
- Repository that contains a set of purposefully erroneous Yara rules.☆61Updated 6 months ago
- TAPIR is a multi-user, client/server, incident response framework☆47Updated 3 years ago
- Cyber Underground General Intelligence Requirements☆97Updated 2 years ago
- A python script developed to process Windows memory images based on triage type.☆263Updated 2 years ago