Code examples from recent blog posts by minerva labs.
☆45Jan 26, 2019Updated 7 years ago
Alternatives and similar repositories for BlogPosts
Users that are interested in BlogPosts are comparing it to the libraries listed below
Sorting:
- Bash script to Check for malicious Cryptomining☆38Aug 19, 2018Updated 7 years ago
- Create Suricata and Snort DNS signatures given a single domain or list of domains in a file.☆18Nov 13, 2017Updated 8 years ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- A free incident response management and documentation workbook☆25Nov 13, 2018Updated 7 years ago
- Fake SMB and SAMR data☆11Oct 27, 2019Updated 6 years ago
- Powershell Functions to interact with TheHive-Project☆11Jun 27, 2019Updated 6 years ago
- a collection of public yara rules☆25Oct 30, 2019Updated 6 years ago
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Jul 13, 2017Updated 8 years ago
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Jan 29, 2020Updated 6 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆38May 2, 2017Updated 8 years ago
- Simple decrypter for strings used in SamSam Ransomware samples.☆18Feb 21, 2020Updated 6 years ago
- Collection of scripts that I have used on Red Team engagements☆16Feb 15, 2018Updated 8 years ago
- Triage automation for suspect URLs☆13Jul 23, 2019Updated 6 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Apr 10, 2017Updated 8 years ago
- List of netblocks with shared hosting on 20170330☆10Apr 10, 2017Updated 8 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- Reconnaissance test in Kubernetes clusters☆21Oct 19, 2018Updated 7 years ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- (Unofficial) Python API for https://malwr.com/☆62Oct 13, 2016Updated 9 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Mar 27, 2017Updated 8 years ago
- ☆68Jun 21, 2017Updated 8 years ago
- Please see other maintained fork:☆17Dec 4, 2025Updated 2 months ago
- Python script to automatically deobfuscate malware code☆59Jul 23, 2018Updated 7 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Oct 30, 2018Updated 7 years ago
- A ton of helpful tools☆39Oct 8, 2021Updated 4 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago
- Feed Generator for MISP☆19Nov 2, 2022Updated 3 years ago
- A repository to share contributions related to TheHive Project☆22Sep 15, 2021Updated 4 years ago
- A security tool for detecting suspicious PDF modifications commonly found in BEC☆41Aug 4, 2016Updated 9 years ago
- Understanding ATT&CK Matrix for Enterprise☆79May 16, 2018Updated 7 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Nov 5, 2019Updated 6 years ago
- ☆16Dec 26, 2022Updated 3 years ago
- ☆19Sep 2, 2018Updated 7 years ago
- Using nDPI/openDPI to detect flow protocols from a PCAP file or live NIC. This program was modified from example in nDPI and I added a pe…☆23May 6, 2016Updated 9 years ago
- Censys.io Python API Search☆43May 3, 2017Updated 8 years ago