Yara-Rules / YaraRET
Carving tool based in Radare2 & Yara
☆16Updated 6 years ago
Alternatives and similar repositories for YaraRET:
Users that are interested in YaraRET are comparing it to the libraries listed below
- ☆22Updated 4 years ago
- Yara rules☆21Updated 2 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 3 years ago
- C# User Simulation☆32Updated 2 years ago
- Hashes of infamous malware☆26Updated last year
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Links to malware-related YARA rules☆15Updated 2 years ago
- A set of tools for collecting forensic information☆26Updated 5 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Updated 5 years ago
- Collection of scripts used to analyse malware or emails☆19Updated 4 years ago
- ☆15Updated 3 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- ☆12Updated 3 years ago
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆13Updated 2 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆29Updated 8 years ago
- ☆15Updated 3 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆13Updated 3 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 5 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Penguin OS Forensic (or Flight) Recorder☆40Updated 3 months ago
- Indicators of Normality☆12Updated 2 years ago
- Static configuration extractor for the Karton framework☆10Updated 3 months ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 2 months ago
- Modular command-line threat hunting tool & framework.☆17Updated 4 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 5 months ago
- ☆24Updated 2 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- Exfiltration based on custom X509 certificates☆26Updated last year