Cisco-Talos / HTML_Reversing_CookbookLinks
A collection of CyberChef recipes for decoding and decrypting strings in HTML attachments
☆10Updated last year
Alternatives and similar repositories for HTML_Reversing_Cookbook
Users that are interested in HTML_Reversing_Cookbook are comparing it to the libraries listed below
Sorting:
- ☆78Updated 3 weeks ago
- Hacked up scripts to perform google searches☆16Updated last year
- DShield Sensor Log Collection with ELK☆44Updated last week
- Knowledge base on cybercriminal concealment techniques☆92Updated 9 months ago
- God Mode Detection Rules☆135Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Updated last year
- ☆29Updated 3 years ago
- ☆83Updated 2 months ago
- A tool to use novel locations to extract metadata from Office documents.☆64Updated 2 years ago
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆90Updated 7 months ago
- Random things for my own reference☆22Updated 3 years ago
- This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.☆46Updated last month
- Examine Chrome extensions for security issues☆93Updated 2 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆63Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- Cyber Underground General Intelligence Requirements☆97Updated 2 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Updated 4 years ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆185Updated 11 months ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Updated 3 years ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆107Updated last year
- BlackBerry Threat Research & Intelligence☆100Updated 2 years ago
- Slides of my public talks☆56Updated 2 years ago
- Memory Forensic System on Cloud☆92Updated 2 years ago
- Linux Evidence Acquisition Framework☆119Updated last year
- ☆101Updated last month
- A YARA & Malware Analysis Toolkit written in Rust.☆91Updated 4 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆126Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆115Updated last year
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated last month