QuoSecGmbH / os_timestampsLinks
Explore how Unix-like OS (Linux, BSD, macOS...) modify MACB timestamps and check against POSIX (non-)compliance
☆19Updated 8 months ago
Alternatives and similar repositories for os_timestamps
Users that are interested in os_timestamps are comparing it to the libraries listed below
Sorting:
- Userland API monitor for threat hunting☆58Updated 5 years ago
- Alternative YARA scanning engine☆70Updated 2 years ago
- Windows Event Log Knowledge Base☆25Updated 8 months ago
- The Dissect module tying all other Dissect modules together. It provides a programming API and command line tools which allow easy access…☆65Updated this week
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆25Updated 2 years ago
- Carve file metadata from NTFS index ($I30) attributes☆66Updated last year
- Scripts to aid analysis of files obfuscated with ScatterBee.☆20Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- YARI is an interactive debugger for YARA Language.☆88Updated last week
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- Script that checks for available updates for the most commonly used Digital Forensics tools☆59Updated 4 years ago
- Simple yara rule manager☆66Updated 2 years ago
- Repository with selected IOCs and YARA rules for threat hunting.☆35Updated last month
- XOR Key Extractor☆50Updated 10 months ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆31Updated 4 years ago
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Updated 2 years ago
- Links to malware-related YARA rules☆15Updated 2 years ago
- Symantec EDR Internals☆26Updated 3 years ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆21Updated 3 years ago
- ☆13Updated 2 years ago
- Unpacking and decryption tools for the Emotet malware☆46Updated 3 years ago
- Random hunting ordiented yara rules☆97Updated 2 years ago
- Sample staging & detonation utility to be used in combination with Cuckoo Sandbox.☆11Updated 4 months ago
- ☆22Updated 8 months ago
- Parsing MITRE EDR Evaluation results☆12Updated 6 years ago
- A Splunk Technology Add-on to forward filtered ETW events.☆30Updated 4 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆45Updated 2 years ago