Code examples from recent blog posts by minerva labs.
☆45Jan 26, 2019Updated 7 years ago
Alternatives and similar repositories for BlogPosts
Users that are interested in BlogPosts are comparing it to the libraries listed below
Sorting:
- Create Suricata and Snort DNS signatures given a single domain or list of domains in a file.☆18Nov 13, 2017Updated 8 years ago
- Simple decrypter for strings used in SamSam Ransomware samples.☆18Feb 21, 2020Updated 6 years ago
- ☆68Jun 21, 2017Updated 8 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- Triage automation for suspect URLs☆13Jul 23, 2019Updated 6 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆38May 2, 2017Updated 8 years ago
- Python script to automatically deobfuscate malware code☆59Jul 23, 2018Updated 7 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Apr 10, 2017Updated 8 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- malware phylogeny for WSO web shell, Shellbot IRC bot and algorithm☆17May 24, 2022Updated 3 years ago
- Understanding ATT&CK Matrix for Enterprise☆79May 16, 2018Updated 7 years ago
- A free incident response management and documentation workbook☆25Nov 13, 2018Updated 7 years ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- IR-Tools - PowerShell tools for IR☆130Jul 10, 2017Updated 8 years ago
- Apply Machine Learning and Game Theory to improve the security of the Turris network of CZ.NIC☆24Sep 24, 2019Updated 6 years ago
- a collection of public yara rules☆25Oct 30, 2019Updated 6 years ago
- ☆16Dec 26, 2022Updated 3 years ago
- Reconnaissance test in Kubernetes clusters☆21Oct 19, 2018Updated 7 years ago
- Collection of scripts that I have used on Red Team engagements☆16Feb 15, 2018Updated 8 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Oct 30, 2018Updated 7 years ago
- A collection of scripts that I've written while pentesting.☆31Aug 3, 2018Updated 7 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Nov 5, 2019Updated 6 years ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago
- Tool for dropping malware from EK☆40Feb 9, 2018Updated 8 years ago
- Fastly scans open ports on large networks and bruteforce login mechanism of found services☆12Aug 24, 2019Updated 6 years ago
- (Unofficial) Python API for https://malwr.com/☆62Oct 13, 2016Updated 9 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Nov 27, 2018Updated 7 years ago
- Please see other maintained fork:☆17Dec 4, 2025Updated 3 months ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 8 years ago
- Various DFIR Tools☆27Jul 23, 2018Updated 7 years ago
- Dump of the crypto-miner that got installed on my system☆14May 30, 2020Updated 5 years ago
- Reinforcement learning crypto trading bot☆10Oct 30, 2020Updated 5 years ago
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- Powershell Functions to interact with TheHive-Project☆11Jun 27, 2019Updated 6 years ago
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Jul 13, 2017Updated 8 years ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- A wrapper for the TextBelt API that allows messages to be sent with delays from the command line.☆16May 19, 2015Updated 10 years ago