DCSO / Blog_CyTecLinks
Repository to provide files related to our blog articles.
☆16Updated last month
Alternatives and similar repositories for Blog_CyTec
Users that are interested in Blog_CyTec are comparing it to the libraries listed below
Sorting:
- Static configuration extractor for the Karton framework☆10Updated 5 months ago
- We publish indicators of compromise related to our stories here. See https://blog.team-cymru.com/ for more information.☆9Updated 3 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Updated 11 months ago
- The Multiplatform Linux Sandbox☆16Updated last year
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Updated 5 months ago
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated last year
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆25Updated 2 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Updated last year
- Tracking APT IOCs☆25Updated 4 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- ☆22Updated 4 years ago
- Setting up a training environment for MISP☆12Updated 2 years ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- Go implementation of the Community ID flow hashing standard☆20Updated 2 months ago
- Suricata rule and intel index☆31Updated 3 months ago
- ☆12Updated 3 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated last year
- ☆23Updated 2 years ago
- ☆15Updated 3 years ago
- DFF (Digital Forensics Framework)☆10Updated 4 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Links to malware-related YARA rules☆15Updated 2 years ago
- ☆12Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 4 months ago
- QuasarRAT analysis tools and research report☆27Updated last year
- Generates YARA rules to detect malware using API hashing☆17Updated 4 years ago
- Python CLI and module for CIRCL hash lookup☆14Updated 4 months ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated last year