REMnux / distroLinks
This repository contains supplemental files for the REMnux distro and the source files for the Debian packages that the distro installs from the REMnux package repository on Launchpad.
☆100Updated this week
Alternatives and similar repositories for distro
Users that are interested in distro are comparing it to the libraries listed below
Sorting:
- This repository maintains the SaltStack state files for the REMnux distro.☆54Updated this week
- This repository contains the source code for the REMnux installer, which is the command-line tool for installing and upgrading the REMnux…☆51Updated last week
- Balbuzard is a package of malware analysis tools in python to extract patterns of interest from suspicious files (IP addresses, domain na…☆140Updated 6 years ago
- Set of Yara rules for finding files using magics headers☆142Updated 5 years ago
- Base components for Assemblyline 4 (Datastore, ODM, Filestore, Remote Datatypes, utils function, etc...)☆71Updated this week
- Valhalla API Client☆70Updated 3 weeks ago
- A modern Python-3-based alternative to RegRipper☆205Updated 10 months ago
- ☆27Updated 6 months ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆109Updated 7 years ago
- Hatching Triage public command-line utility and API library.☆74Updated 2 years ago
- This repository contains Dockerfiles for building Docker images of popular malware analysis tools, which are distributed through the REMn…☆291Updated last week
- Software downloads☆109Updated 9 months ago
- Automagically extract forensic timeline from volatile memory dump☆132Updated last year
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆208Updated 10 months ago
- Tools to assist in forensicating docker☆86Updated 11 months ago
- ☆143Updated 2 months ago
- A better strings utility!☆149Updated last week
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆117Updated 3 weeks ago
- A system that creates a bogus web structure to entrap and delay web scanners☆66Updated 4 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆97Updated last week
- Automatically create YARA rules from malicious documents.☆212Updated 3 years ago
- An AFF4 C++ implementation.☆213Updated 2 years ago
- Automated handling of data feeds for security teams☆147Updated last month
- SANS Slingshot Linux Distribution☆56Updated 5 years ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆301Updated 2 years ago
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Updated 5 years ago
- MAEC Schemas and Schema Development☆89Updated 6 years ago
- ☆37Updated 5 years ago
- ☆128Updated last year
- Defensomania is a security monitoring and incident response card game.☆64Updated 2 years ago