Investigation Planner for long running analysis with unpredictable execution time. For example, dynamic analysis.
☆16Apr 24, 2017Updated 8 years ago
Alternatives and similar repositories for Holmes-Totem-Dynamic
Users that are interested in Holmes-Totem-Dynamic are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Main program for receiving tasking and objects. It validates input, checks authentication, and pushes the requests to the pipeline.☆14Jul 21, 2017Updated 8 years ago
- The Storage Planner manages access to all data within the Holmes Processing system. It orchestrates the interaction across multiple Datab…☆15Dec 26, 2018Updated 7 years ago
- Investigation Planner for fast running analysis with predictable execution time. For example, static analysis.☆27Jun 2, 2019Updated 6 years ago
- Carving tool based in Radare2 & Yara☆17Oct 30, 2018Updated 7 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- Lightweight and extensible horizontal vulnerability scanner☆11Dec 8, 2022Updated 3 years ago
- certgrep is a cross-platform command line tool that extracts SSL certificates from either a network interface or a local PCAP file.☆18Nov 12, 2021Updated 4 years ago
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆50May 16, 2022Updated 3 years ago
- ☆11Jul 21, 2023Updated 2 years ago
- SourceDrop for OS X☆25Mar 12, 2015Updated 11 years ago
- bareflank based hypervisor with guest support☆63Sep 10, 2020Updated 5 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Lamport and Vector clocks☆13Sep 10, 2015Updated 10 years ago
- 270+ Flag-icons for Svelte☆15Feb 28, 2026Updated 3 weeks ago
- A blanket execution/min hash semantic hash tool for binary function identification☆18Apr 22, 2016Updated 9 years ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆61Feb 11, 2026Updated last month
- ☆13Apr 6, 2016Updated 9 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Apr 13, 2017Updated 8 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Sep 4, 2023Updated 2 years ago
- Windows 64-bits driver☆17Dec 1, 2017Updated 8 years ago
- FACT analysis plug-in that maps software version to cves☆13Nov 14, 2019Updated 6 years ago
- ☆19Dec 1, 2024Updated last year
- A script to analyze geographic GSuite Login activity☆10Sep 3, 2017Updated 8 years ago
- Python library for musical audio synthesis☆17May 3, 2024Updated last year
- Linux-KVM with rVMI extensions☆22Aug 28, 2017Updated 8 years ago
- LNK to JSON☆14Mar 7, 2019Updated 7 years ago
- recovers and reconstructs fragmented Evtx files from disk images, memory dumps, pagefiles and unallocated space☆13Feb 3, 2015Updated 11 years ago
- A very simple calculator made with Codea on the iPad☆19May 14, 2012Updated 13 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- Flagpack contains 250+ easily implementable flag icons to use in your design or code project.☆12Mar 11, 2026Updated 2 weeks ago
- Python command-line tool that uses nearest neighbor search methods for malware similarity analysis☆16Jan 29, 2019Updated 7 years ago
- Understand OVAL results in a blink of an eye☆35Jul 6, 2022Updated 3 years ago
- protoc plugin that generates type safe scala wrappers for java protoc output☆42Aug 18, 2010Updated 15 years ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- XML representation of the x86 instruction set☆29Feb 15, 2026Updated last month
- It's a fuction that returns the length of an x86 instruction☆22Nov 20, 2011Updated 14 years ago
- Projekt verejne.digital má za cieľ aplikovať umelú inteligenciu na dáta zverejňované slovenskými verejnými inštitúciami.☆25May 22, 2023Updated 2 years ago
- • Packet capture (PCAP) file analysis to analyze traffic sent by malicious IP address.☆12Jan 1, 2015Updated 11 years ago
- ☆16Jan 16, 2026Updated 2 months ago