Cisco-Talos / file2pcap
☆168Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for file2pcap
- ☆200Updated last year
- ☆76Updated 2 years ago
- Extract files from network traffic with Zeek.☆99Updated 4 years ago
- a network packet capture compiler☆192Updated 2 years ago
- This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant ya…☆120Updated 3 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆184Updated last year
- ☆307Updated 7 years ago
- Suricata Extreme Performance Tuning guide☆203Updated 6 years ago
- Bro scripts to be shared with the community☆109Updated 11 years ago
- Differential Analysis of Malware in Memory☆209Updated 7 years ago
- Honeynet Project generic authenticated datafeed protocol☆211Updated last year
- Bro scripts written by CrowdStrike Services☆146Updated 3 years ago
- BASS - BASS Automated Signature Synthesizer☆173Updated 6 years ago
- Web interface for the Volatility Memory Forensics Framework☆259Updated 6 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆148Updated 5 months ago
- dionaea low interaction honeypot (forked from dionaea.carnivore.it)☆154Updated 9 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆79Updated 8 years ago
- Collecting & Hunting for IOCs with gusto and style☆116Updated 6 years ago
- Various Bro scripts☆96Updated 8 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆285Updated 7 years ago
- a Malware/Threat Analyst Desktop☆89Updated 9 years ago
- Improvements of/over the original rule2alert☆56Updated 9 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated last year
- Django web interface for managing Yara rules☆190Updated 6 years ago
- 16,432 Free Yara rules created by☆380Updated 5 years ago
- A framework for receiving and redistributing abuse feeds☆118Updated 5 years ago
- Protocol Analysis/Decoder Framework☆489Updated last year
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆263Updated 3 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Updated 8 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆192Updated 7 years ago