Cisco-Talos / HTML_Reversing_CookbookLinks
A collection of CyberChef recipes for decoding and decrypting strings in HTML attachments
☆10Updated last year
Alternatives and similar repositories for HTML_Reversing_Cookbook
Users that are interested in HTML_Reversing_Cookbook are comparing it to the libraries listed below
Sorting:
- ☆78Updated 3 weeks ago
- ☆29Updated 3 years ago
- This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.☆46Updated last month
- DShield Sensor Log Collection with ELK☆44Updated last week
- Examine Chrome extensions for security issues☆93Updated 2 months ago
- God Mode Detection Rules☆135Updated last year
- Conference presentations☆60Updated 3 months ago
- Fast IOC and YARA Scanner☆88Updated 5 years ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated last month
- SANS Slingshot Linux Distribution☆56Updated 5 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- Python command line tool used for generating GIAC Certification indexes.☆29Updated 2 years ago
- Collection of videos of Raids on Cybercriminals☆21Updated 10 months ago
- ☆27Updated 6 months ago
- ☆39Updated 5 years ago
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆90Updated 7 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆55Updated last year
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27Updated 8 months ago
- Slides of my public talks☆56Updated 2 years ago
- Search a filesystem for indicators of compromise (IoC).☆83Updated last month
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆56Updated 4 years ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Updated last year
- Hacked up scripts to perform google searches☆16Updated last year
- Repository of tools and resources for analyzing Docker containers☆72Updated 2 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆57Updated 3 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Updated 4 years ago
- Memory Forensic System on Cloud☆92Updated 2 years ago
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆49Updated 3 years ago
- DNS Dashboard for hunting and identifying beaconing☆16Updated 5 years ago
- Knowledge base on cybercriminal concealment techniques☆92Updated 9 months ago