Aldenar / salt-malware-sourcesLinks
Source files found after a recent hack of one of my machines, showing how the infection spreads itself and what it does, useful for analysis of other infected machines
☆13Updated 5 years ago
Alternatives and similar repositories for salt-malware-sources
Users that are interested in salt-malware-sources are comparing it to the libraries listed below
Sorting:
- AWS EKS Cluster Forensics☆23Updated 4 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 4 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 6 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Updated 3 years ago
- Visual Studio Code extension for MITRE ATT&CK☆55Updated last year
- Serverless honeytoken 🕵🏻♂️☆81Updated 2 years ago
- Things to know when DFIR occurs near a vault deployment.☆44Updated 7 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Updated 4 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated 7 months ago
- Provide a shell like interface by utilizing osquery's distributed API☆82Updated 5 years ago
- pollen - A command-line tool for interacting with TheHive☆36Updated 6 years ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆29Updated 3 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 4 years ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆59Updated 3 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 7 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆162Updated 5 years ago
- A Passive SSH back-end and scanner.☆104Updated 6 months ago
- NTFS file system specimens☆13Updated 2 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆43Updated 3 years ago
- Carving tool based in Radare2 & Yara☆17Updated 7 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Updated 4 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 3 months ago
- Tools for Network Archaeology (internet protocol analysis)☆29Updated 3 months ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆40Updated 11 months ago
- Browser Shortcuts for Cyber Security Related Online Services☆78Updated 4 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆128Updated 2 years ago
- ☆24Updated 3 years ago
- ☆29Updated 11 months ago
- Cisco Orbital - Osquery queries by Talos☆136Updated last year