Malformed Access Log to CSV - Convert Web Server Access Logs to CSV
☆18Sep 3, 2024Updated last year
Alternatives and similar repositories for mal2csv
Users that are interested in mal2csv are comparing it to the libraries listed below
Sorting:
- YARA duplicate rule detection and removal. YARA rule index creation. YARA rule file merger.☆10Jan 19, 2026Updated 2 months ago
- ASN.1 parser used by PeNet do parse Authenticode signatures☆14Apr 11, 2025Updated 11 months ago
- Collection of scripts for use with Carbon Black Cb Response API☆14May 7, 2022Updated 3 years ago
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- Forensic cheatsheets for use with cheat☆15Dec 2, 2021Updated 4 years ago
- Lookup file hashes, domain names and IP addresses using various vendors to assist with triaging potential threats.☆29Feb 15, 2026Updated last month
- Python script for parsing ESET (NOD32) virlog.dat file.☆14Sep 28, 2017Updated 8 years ago
- Repository to track community hardware, data and funding.☆12Apr 8, 2022Updated 3 years ago
- Just Another broken Registry Parser (JARP)☆16May 23, 2024Updated last year
- A GeoIP lookup utility utilizing ipinfo.io services.☆30Dec 1, 2023Updated 2 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Read Registry.pol files on Linux, or anywhere Python runs!☆17Jun 12, 2023Updated 2 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆82Mar 25, 2024Updated last year
- A fast, possibly the fastest, square root function for large integers and floats in C# and Java. The algorithm uses a variety of new and …☆16Mar 27, 2025Updated 11 months ago
- Buchbergers algorithm for computing Groebner basis of polynonmial ideals☆13Dec 2, 2023Updated 2 years ago
- ☆36Jan 11, 2023Updated 3 years ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- Publicly shareable windows event log message data☆28Nov 29, 2019Updated 6 years ago
- LINQ to Z3 - an esoteric LINQ binding based on Bart De Smet's idea☆14Nov 23, 2021Updated 4 years ago
- ☆11Jun 12, 2023Updated 2 years ago
- Repo that hold write-ups of various research projects I did and/or overall InfoSec things I investigated/researched.☆22Jan 5, 2025Updated last year
- Creates a counting system of radixes such as base 12 or mixed radixes such as Minutes/Hours/Days/Years (60/60/24/365)☆13May 8, 2019Updated 6 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- ☆11Mar 12, 2021Updated 5 years ago
- Parser for Sdba memory pool tags☆21Jul 16, 2021Updated 4 years ago
- A GC link parser for both linkfiles and jumplists.☆18Oct 28, 2016Updated 9 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- Rhaegal is a tool written in Python 3 used to scan Windows Event Logs for suspicious logs. Rhaegal uses custom rule format to detect sus…☆43Sep 21, 2023Updated 2 years ago
- CryptnetURLCacheParser is a tool to parse CryptAPI cache files☆21Aug 3, 2024Updated last year
- Library of threat hunts to get any user started!☆50Sep 4, 2020Updated 5 years ago
- Backstage Parser☆33Jun 23, 2022Updated 3 years ago
- lnk_parser is a full rust implementation to parse windows LNK files☆23Feb 17, 2026Updated last month
- Python web app for previewing data in a Chrome Profile Folder☆24Jul 1, 2024Updated last year
- A complete, proof-of-concept, C# implementation of the General Number Field Sieve algorithm for factoring very large semi-prime numbers. …☆62May 24, 2025Updated 9 months ago
- A Dissect module implementing a parser for Microsofts Extensible Storage Engine Database (ESEDB), used for example in Active Directory, E…☆25Nov 20, 2025Updated 4 months ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆19Jun 6, 2022Updated 3 years ago
- Hikeshi is a security incident response application that keeps documenting incidents simple, so you can focus on fighting fires.☆21Mar 6, 2023Updated 3 years ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆110Feb 6, 2026Updated last month
- Crawl (~600K) labeled Portable Exe files from Microsoft Cabs☆14Jul 31, 2021Updated 4 years ago