Yara-Rules / YaraRET
Carving tool based in Radare2 & Yara
☆15Updated 5 years ago
Related projects: ⓘ
- ☆22Updated 3 years ago
- Hashes of infamous malware☆24Updated last year
- Threat hunting with EQL and Bro. This repo contains modifications to EQL and EQLLib to use BRO logs.☆8Updated 5 years ago
- Yara rules☆18Updated last year
- ☆12Updated 3 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 4 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆21Updated 7 months ago
- Collection of scripts used to analyse malware or emails☆19Updated 3 years ago
- Can you pay the ransom in your country?☆13Updated 9 months ago
- Public repository for Red Canary Research☆33Updated 3 years ago
- A set of tools for collecting forensic information☆24Updated 4 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆11Updated 3 years ago
- Scripts and lists to help generate YARA friendly string mutations☆19Updated last year
- A list of IOCs applicable to PoshC2☆23Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆27Updated 8 years ago
- C# User Simulation☆33Updated last year
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 3 years ago
- ☆15Updated 2 years ago
- Penguin OS Forensic (or Flight) Recorder☆37Updated last month
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆29Updated 2 months ago
- Standardized Malware Analysis Tool☆51Updated 3 years ago
- ☆14Updated last year
- Links to malware-related YARA rules☆14Updated last year
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆30Updated last month
- ☆22Updated last year
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- Presentation materials for talks I've given.☆20Updated 4 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Updated 5 years ago