CAPESandbox / sflock
Sample staging & detonation utility to be used in combination with Cuckoo Sandbox.
☆11Updated 2 months ago
Alternatives and similar repositories for sflock:
Users that are interested in sflock are comparing it to the libraries listed below
- Python CLI and module for CIRCL hash lookup☆12Updated 3 months ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- xlrd2 is a variant of xlrd that is actively maintained☆23Updated 9 months ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated last year
- Fast lookup server for NSRL and other hash database used in digital forensic☆44Updated 2 years ago
- Static configuration extractor for the Karton framework☆10Updated 3 months ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆21Updated 3 years ago
- ☆12Updated 3 years ago
- Digital Forensics date and time☆23Updated 4 months ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- ☆16Updated 2 years ago
- Yara filetype plugin for Vim.☆14Updated 4 years ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated last year
- We publish indicators of compromise related to our stories here. See https://blog.team-cymru.com/ for more information.☆9Updated 3 years ago
- Parser for Sdba memory pool tags☆18Updated 3 years ago
- Automate the regular transfer of AIS data into a MISP Server☆9Updated 11 months ago
- ☆13Updated 2 years ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- Collection of tools for processing storage media images☆13Updated 4 months ago
- Indicators of Normality☆12Updated 2 years ago
- All TMF files that I extracted from Microsoft PDBs.☆12Updated 5 years ago
- Yara syntax highlighting☆25Updated 3 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- Automatic generator of YARA modules based in protocol buffers☆16Updated 3 months ago
- THOR APT Scanner User Manual☆18Updated last week
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 3 years ago
- This repository regroups the Yara Rules for the Unprotect Project☆25Updated 4 years ago
- The hidden mstsc recorder player☆28Updated 5 years ago
- ☆47Updated 5 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆18Updated 4 years ago