Sp3ctr3 / PyTriageLinks
A python script for easy static analysis and automatic signature generation of malware.
☆12Updated 12 years ago
Alternatives and similar repositories for PyTriage
Users that are interested in PyTriage are comparing it to the libraries listed below
Sorting:
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Updated 5 years ago
- A curated list of tools for incident response☆34Updated last year
- Basic file metadata gathering script☆21Updated 9 months ago
- Digital Forensics and Incident Response Wiki☆40Updated 11 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 5 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Updated 8 years ago
- ☆18Updated 7 years ago
- Collection of Nmap scripts☆10Updated 10 years ago
- Create an incident response triage toolkit for use with Windows or Linux.☆18Updated 5 years ago
- Custom scripts used during the scenario☆21Updated 4 years ago
- Script to parse Process Monitor XML log file, and give you a summary report.☆24Updated 9 years ago
- Automated Security Assessment Reporting Tool☆37Updated 8 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 14 years ago
- Set of utilities for getting information about Windows Events☆15Updated 7 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated last month
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆65Updated 6 years ago
- Tool for analysts to perform simultaneous lookups (IP, Domain, URL, MD5) against multiple data sources☆29Updated 9 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Updated 3 years ago
- ☆13Updated 6 years ago
- This is a framework written in EnScript to utilize the network capabilities of EnCase. The purpose is to allow for someone to build a qui…☆13Updated 10 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- ☆30Updated 7 years ago
- VirusTotal SIEM Integration and Automation☆18Updated 9 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Parses Java Cache IDX files☆40Updated 7 years ago
- Docker container for datasploit framework☆25Updated 8 years ago
- Automated forensics written in PowerShell☆34Updated 6 years ago
- Collect hashes password hashes for cracking☆32Updated 12 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 10 years ago
- A security tool for detecting suspicious PDF modifications commonly found in BEC☆41Updated 9 years ago