Cisco-Talos / HTML_Reversing_CookbookLinks
A collection of CyberChef recipes for decoding and decrypting strings in HTML attachments
☆10Updated last year
Alternatives and similar repositories for HTML_Reversing_Cookbook
Users that are interested in HTML_Reversing_Cookbook are comparing it to the libraries listed below
Sorting:
- DShield Sensor Log Collection with ELK☆46Updated this week
- ☆79Updated last month
- Knowledge base on cybercriminal concealment techniques☆89Updated 7 months ago
- God Mode Detection Rules☆134Updated last year
- Hacked up scripts to perform google searches☆16Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Updated last year
- ☆74Updated 2 months ago
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆112Updated last week
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- Linux Evidence Acquisition Framework☆117Updated last year
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆90Updated 6 months ago
- Collection of useful Canary tools☆91Updated last month
- Memory Forensic System on Cloud☆92Updated 2 years ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆106Updated last year
- Cloudformation Template to Launch the SOC from Kali Purple☆53Updated 2 years ago
- Repository of tools and resources for analyzing Docker containers☆71Updated 2 years ago
- Resources, tools and utilities about Threat Intelligence☆75Updated 2 years ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆116Updated last week
- HASH (HTTP Agnostic Software Honeypot)☆141Updated last year
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Updated 3 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated last year
- Fast IOC and YARA Scanner☆86Updated 5 years ago
- ☆74Updated 2 months ago
- A ruleset to find potentially malicious code in macOS malware samples☆41Updated 2 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆160Updated 8 months ago
- ReWrite of AChoir in Go for Cross Platform forensic artifact collection and processing☆42Updated this week
- ☆100Updated 2 weeks ago
- Website for ail-typo-squatting library☆68Updated 2 months ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆40Updated last week