☆224Sep 8, 2022Updated 3 years ago
Alternatives and similar repositories for Sandbox_Scryer
Users that are interested in Sandbox_Scryer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- JPCERT/CC public YARA rules repository☆111Mar 9, 2026Updated last month
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆869Jan 20, 2022Updated 4 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 4 years ago
- Elastic Security detection content for Endpoint☆1,421Updated this week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97May 28, 2023Updated 2 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆256Oct 29, 2025Updated 6 months ago
- ☆80Apr 18, 2023Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆102May 11, 2022Updated 3 years ago
- Modular malware analysis artifact collection and correlation framework☆56Apr 23, 2024Updated 2 years ago
- BlueHound - pinpoint the security issues that actually matter☆763Jul 12, 2023Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 3 years ago
- Yet Another Memory Analyzer for malware detection☆205Apr 8, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆90Sep 16, 2023Updated 2 years ago
- A C# based tool for analysing malicious OneNote documents☆118Apr 4, 2023Updated 3 years ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,523Apr 1, 2026Updated last month
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆706Apr 21, 2026Updated last week
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- firedrill is a malware simulation harness for evaluating your security controls☆199Jan 26, 2024Updated 2 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Jan 30, 2026Updated 3 months ago
- Cross-platform incident response and live forensics toolkit with built-in detection, structured analysis, and report generation — designe…☆618Apr 13, 2026Updated 2 weeks ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,108Dec 11, 2024Updated last year
- YARA rule analyzer to improve rule quality and performance☆113Jan 18, 2026Updated 3 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆209Jul 21, 2022Updated 3 years ago
- Open Source EDR for Windows☆1,301Feb 25, 2023Updated 3 years ago
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,135Updated this week
- ☆20Apr 10, 2025Updated last year
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,213Feb 20, 2026Updated 2 months ago
- Threat Hunting tool about Sysmon and graphs☆339May 28, 2023Updated 2 years ago
- a PE Loader and Windows API tracer. Useful in malware analysis.☆143Sep 19, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Data visualization for blue teams☆127Jan 20, 2023Updated 3 years ago
- Fully modular persistence framework☆259Apr 10, 2023Updated 3 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- Sandman is a NTP based backdoor for hardened networks.☆818Mar 31, 2024Updated 2 years ago
- Windows kernel and user mode emulation.☆1,949Apr 8, 2026Updated 3 weeks ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆254Nov 18, 2024Updated last year
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆624Dec 8, 2025Updated 4 months ago