EFForg / yayaLinks
Yet Another Yara Automaton - Automatically curate open source yara rules and run scans
☆295Updated last year
Alternatives and similar repositories for yaya
Users that are interested in yaya are comparing it to the libraries listed below
Sorting:
- User guide of MISP☆280Updated 10 months ago
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆321Updated 6 months ago
- MISP trainings, threat intel and information sharing training materials with source code☆419Updated 5 months ago
- MISP Docker (XME edition)☆283Updated last year
- ☆175Updated last year
- This is a repository for freq.py and freq_server.py☆211Updated 5 years ago
- ☆222Updated last year
- Awesome VirusTotal Intelligence Search Queries☆333Updated 2 years ago
- A framework for orchestrating forensic collection, processing and data export☆332Updated 2 weeks ago
- Forensics artefact collection tool for systems running Microsoft Windows☆425Updated 7 months ago
- Online hash checker for Virustotal and other services☆836Updated 7 months ago
- Zeek Log Cheatsheets☆297Updated 2 months ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆271Updated this week
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆385Updated 3 years ago
- DFIRTrack - The Incident Response Tracking Application☆525Updated last year
- A tool designed to hunt for Phishing Kit source code☆225Updated 2 years ago
- simple YARA-based IOC scanner☆169Updated 3 weeks ago
- A list of my personal projects☆177Updated 3 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆249Updated 4 years ago
- A live dashboard for a real-time overview of threat intelligence from MISP instances☆204Updated 2 years ago
- Yara Rule Analyzer and Statistics☆393Updated 2 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆254Updated 2 years ago
- Automatically create YARA rules from malicious documents.☆212Updated 3 years ago
- Extension to Cuckoo Sandbox open source projects, adds support to AWS cloud functionalities and enables running emulation on auto-scaling…☆135Updated 3 years ago
- Zeek-Formatted Threat Intelligence Feeds☆378Updated this week
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆503Updated 3 years ago
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆264Updated 2 years ago
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 5 years ago
- Collecting & Hunting for IOCs with gusto and style☆241Updated 4 years ago
- ☆211Updated 4 months ago