PayloadSecurity / Sandbox_ScryerLinks
☆226Updated 3 years ago
Alternatives and similar repositories for Sandbox_Scryer
Users that are interested in Sandbox_Scryer are comparing it to the libraries listed below
Sorting:
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆257Updated 2 years ago
- ☆149Updated last month
- A python script developed to process Windows memory images based on triage type.☆265Updated 2 years ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97Updated 2 years ago
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆370Updated 3 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆208Updated 3 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆119Updated 2 years ago
- Data visualization for blue teams☆126Updated 2 years ago
- ☆131Updated last year
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Updated 2 years ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆168Updated 2 years ago
- ☆211Updated last week
- OSSEM Data Dictionaries☆65Updated 10 months ago
- ☆76Updated 2 months ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- YARA rule analyzer to improve rule quality and performance☆107Updated 8 months ago
- ☆195Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆147Updated 2 years ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆80Updated 6 months ago
- ☆212Updated 6 months ago
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆159Updated 2 years ago
- The Windows Malware Analysis Reversing Core Tools☆97Updated 4 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆251Updated last month
- Blue Team detection lab created with Terraform and Ansible in Azure.☆172Updated last year
- A guide on how to write fast and memory friendly YARA rules☆157Updated 10 months ago
- Memory Forensic System on Cloud☆92Updated last year
- #ThreatHunting #DFIR #Malware #Detection Mind Maps☆305Updated 4 years ago
- JPCERT/CC public YARA rules repository☆110Updated last month
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆206Updated last week
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Updated 3 years ago