RandomRhythm / Vendor-Threat-Triage-Lookup
Lookup file hashes, domain names and IP addresses using various vendors to assist with triaging potential threats.
☆29Updated 7 months ago
Alternatives and similar repositories for Vendor-Threat-Triage-Lookup:
Users that are interested in Vendor-Threat-Triage-Lookup are comparing it to the libraries listed below
- Analysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules☆50Updated last year
- HXTool is an extended user interface for the FireEye HX Endpoint product. HXTool can be installed on a dedicated server or on your physic…☆79Updated 10 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- ☆87Updated last year
- Digital Forensics Artifacts Knowledge Base☆81Updated 11 months ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Yara Based Detection Engine for web browsers☆47Updated 3 years ago
- Random hunting ordiented yara rules☆95Updated 2 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- Script for parsing Symantec Endpoint Protection logs, VBNs, and ccSubSDK database.☆64Updated 2 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆22Updated 3 years ago
- Collection of YARA signatures from individual research☆44Updated last year
- Repository with selected IOCs and YARA rules for threat hunting.☆35Updated 3 months ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆165Updated 2 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆96Updated last week
- Because phishtank was taken.. explore phishing kits in a contained environment!☆46Updated 2 years ago
- Indicators of compromise, YARA rules, and Python scripts to supplement the SANS CTI Summit 2021 talk: "xStart when you're ready".☆14Updated 3 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 2 years ago
- ☆68Updated 2 months ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆77Updated this week
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆100Updated 3 months ago
- A collection of my public YARA signatures for various malware families☆29Updated 7 months ago
- VirusTotal Intelligence Search☆36Updated 4 years ago
- Stand-alone parser for User Access Logging from Server 2012 and newer systems☆73Updated last year
- Incident Response Network Tools☆24Updated 3 years ago
- ☆19Updated 2 years ago
- Links to malware-related YARA rules☆15Updated 2 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆114Updated last year
- Detect possible sysmon logging bypasses given a specific configuration☆108Updated 6 years ago