Sh3lldor / PVTLinks
PCAP visualization tool
☆103Updated 2 years ago
Alternatives and similar repositories for PVT
Users that are interested in PVT are comparing it to the libraries listed below
Sorting:
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆255Updated 2 years ago
- A collection of tools to interact with Microsoft Security Response Center API☆101Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in th…☆87Updated 3 years ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆135Updated last year
- ELFEN: Automated Linux Malware Analysis Sandbox☆126Updated last week
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆169Updated 2 years ago
- Visually inspect and force decode YARA and regex matches found in both binary and text data. With Colors.☆136Updated last month
- Data visualization for blue teams☆126Updated 2 years ago
- A golang CLI tool to download malware from a variety of sources.☆150Updated last month
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆131Updated last year
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆132Updated 7 months ago
- Fraktal's Ransomware Emulator☆102Updated last year
- A repo to support the book☆108Updated 4 years ago
- The Dissect module tying all other Dissect modules together. It provides a programming API and command line tools which allow easy access…☆71Updated this week
- ☆208Updated 2 months ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆138Updated last year
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- ☆226Updated 2 years ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆160Updated 3 years ago
- Reads and prints information from the website MalAPI.io☆39Updated 3 years ago
- A guide on how to write fast and memory friendly YARA rules☆151Updated 6 months ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆193Updated last week
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆204Updated 3 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- The Windows Malware Analysis Reversing Core Tools☆96Updated 4 years ago
- All kinds of tiny shells☆58Updated 2 years ago
- Yara Rules for Modern Malware☆79Updated last year
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆83Updated last year