Yamato-Security / RustyBlue
RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.
☆72Updated 2 years ago
Alternatives and similar repositories for RustyBlue:
Users that are interested in RustyBlue are comparing it to the libraries listed below
- A DFIR tool to analyze artifacts on macOS☆33Updated 4 years ago
- ログ分析トレーニング用コンテンツ☆89Updated 4 years ago
- Ghidra Script for automated analysis of EMOTET☆17Updated 4 years ago
- 分析ツール結果シート☆19Updated 7 years ago
- R-CSIRT Linux Triage tool☆38Updated 6 years ago
- CDIR Analyzer - parsers for data collected by CDIR Collector☆18Updated last year
- CDIR (Cyber Defense Institute Incident Response) Collector - live collection tool based on oss tool/library☆156Updated 4 months ago
- Yet Another Memory Analyzer for malware detection☆177Updated 9 months ago
- Phishing URL dataset from JPCERT/CC☆172Updated 3 weeks ago
- コンテナ内から安全にダークウェブをクローリングするための環境☆13Updated 2 years ago
- Simple SQL Injection Lab: Hands-on guide and Docker setup for exploring MySQL and PostgreSQL injection techniques☆30Updated 2 years ago
- EXIST is a web application for aggregating and analyzing cyber threat intelligence.☆152Updated 2 years ago
- ☆60Updated 10 months ago
- OSS Vulnerability Scanner for Windows Platform☆153Updated 5 years ago
- ☆22Updated 5 months ago
- ペネトレーションテストについて☆74Updated 3 years ago
- Automatically update IoC for lucky visitor scam☆26Updated this week
- Sample evtx files to use for testing hayabusa detection rules☆51Updated 4 months ago
- A DFIR tool to collect artifacts on macOS☆54Updated 5 years ago
- ☆26Updated 4 years ago
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆18Updated last week
- Ochakai Hardening is a tool that allows users to easily experience incident response training.☆18Updated 5 months ago
- Prompt Hardener is a tool designed to evaluate and enhance the securify of system prompts for RAG systems.☆16Updated 3 months ago
- 高対話型ハニーポット☆27Updated 6 years ago
- Decentralized Cyber Threat Intelligence Kaizen Framework☆24Updated 3 years ago
- 2018年4月 - 5月にかけて、Windowsでのリバースエンジニアリングについて「リバースエンジニアリングバイブル」を中心に勉強したメモやサンプルコード。☆15Updated 6 years ago
- Stack-based Buffer Overflow - Vulnerable binaries and exploit samples for pwnable beginners☆18Updated 3 years ago
- JPCERT/CC public YARA rules repository☆106Updated 3 months ago
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆45Updated 2 years ago
- Takajō (鷹匠) is a Hayabusa results analyzer.☆108Updated 3 weeks ago