Yamato-Security / RustyBlueLinks
RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.
☆73Updated 2 years ago
Alternatives and similar repositories for RustyBlue
Users that are interested in RustyBlue are comparing it to the libraries listed below
Sorting:
- A DFIR tool to analyze artifacts on macOS☆33Updated 4 years ago
- CDIR (Cyber Defense Institute Incident Response) Collector - live collection tool based on oss tool/library☆160Updated 9 months ago
- ログ分析トレーニング用コンテンツ☆93Updated 5 years ago
- R-CSIRT Linux Triage tool☆39Updated 7 years ago
- Ghidra Script for automated analysis of EMOTET☆17Updated 4 years ago
- Phishing URL dataset from JPCERT/CC☆181Updated 3 months ago
- Yet Another Memory Analyzer for malware detection☆189Updated 3 months ago
- CDIR Analyzer - parsers for data collected by CDIR Collector☆18Updated 2 years ago
- 分析ツール結果シート☆19Updated 7 years ago
- Sample evtx files to use for testing hayabusa detection rules☆59Updated 9 months ago
- EXIST is a web application for aggregating and analyzing cyber threat intelligence.☆152Updated 2 years ago
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆22Updated last month
- ☆23Updated 9 months ago
- Decentralized Cyber Threat Intelligence Kaizen Framework☆26Updated 3 years ago
- A DFIR tool to collect artifacts on macOS☆55Updated 5 years ago
- ☆62Updated last year
- JPCERT/CC public YARA rules repository☆110Updated 7 months ago
- OSS Vulnerability Scanner for Windows Platform☆154Updated 5 years ago
- Takajō (鷹匠) is a Hayabusa results analyzer.☆130Updated this week
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆13Updated this week
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆64Updated 2 years ago
- Automatically update IoC for lucky visitor scam☆26Updated 3 months ago
- コンテナ内から安全にダークウェブをクローリングするための環境☆14Updated 2 years ago
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆45Updated 2 years ago
- A dataset with CloudTrail events from an attack simulation using Stratus.☆21Updated 2 years ago
- Memory Forensic System on Cloud☆90Updated last year
- ETW forensic tool for Volatility3 plugin☆16Updated 8 months ago
- macOS forensic timeline generator using the analysis result DBs of mac_apt☆94Updated last year
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (ext4, XFS) journals (not systemd-journald logs), gene…☆77Updated last week
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆80Updated 2 months ago