☆225Sep 8, 2022Updated 3 years ago
Alternatives and similar repositories for Sandbox_Scryer
Users that are interested in Sandbox_Scryer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- JPCERT/CC public YARA rules repository☆111Mar 9, 2026Updated 2 months ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆866Jan 20, 2022Updated 4 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 4 years ago
- Elastic Security detection content for Endpoint☆1,429May 11, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97May 28, 2023Updated 2 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆257Oct 29, 2025Updated 6 months ago
- ☆80Apr 18, 2023Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆102May 11, 2022Updated 4 years ago
- Modular malware analysis artifact collection and correlation framework☆56Apr 23, 2024Updated 2 years ago
- BlueHound - pinpoint the security issues that actually matter☆765Jul 12, 2023Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆30Mar 21, 2023Updated 3 years ago
- Yet Another Memory Analyzer for malware detection☆207Apr 8, 2025Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆90Sep 16, 2023Updated 2 years ago
- A C# based tool for analysing malicious OneNote documents☆119Apr 4, 2023Updated 3 years ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,548May 9, 2026Updated last week
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆715May 2, 2026Updated 3 weeks ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- firedrill is a malware simulation harness for evaluating your security controls☆199Jan 26, 2024Updated 2 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Jan 30, 2026Updated 3 months ago
- Cross-platform incident response and live forensics toolkit with built-in detection, structured analysis, and report generation — designe…☆620Apr 28, 2026Updated 3 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- YARA rule analyzer to improve rule quality and performance☆113Jan 18, 2026Updated 4 months ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,113Dec 11, 2024Updated last year
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆209Jul 21, 2022Updated 3 years ago
- Open Source EDR for Windows☆1,304Feb 25, 2023Updated 3 years ago
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,169Updated this week
- ☆20Apr 10, 2025Updated last year
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,214Feb 20, 2026Updated 3 months ago
- Threat Hunting tool about Sysmon and graphs☆339May 28, 2023Updated 2 years ago
- a PE Loader and Windows API tracer. Useful in malware analysis.☆143Sep 19, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Data visualization for blue teams☆127Jan 20, 2023Updated 3 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- Sandman is a NTP based backdoor for hardened networks.☆818Mar 31, 2024Updated 2 years ago
- Fully modular persistence framework☆259Apr 10, 2023Updated 3 years ago
- Windows kernel and user mode emulation.☆1,967Updated this week
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆254Nov 18, 2024Updated last year
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆629May 9, 2026Updated last week