abhinavbom / claraLinks
Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets
☆31Updated last month
Alternatives and similar repositories for clara
Users that are interested in clara are comparing it to the libraries listed below
Sorting:
- Generate bulk YARA rules from YAML input☆22Updated 5 years ago
- Serverless honeytoken 🕵🏻♂️☆80Updated 2 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- Automatic detection engineering technical state compliance☆55Updated last year
- Remotely collect linux live forensics artifacts.☆14Updated 3 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Updated last year
- Integration between MISP platform and McAfee MVISION EDR☆14Updated 3 years ago
- Yara rules for malicious javascript files from public repositories or written by me.☆13Updated 3 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 8 years ago
- AWS EKS Cluster Forensics☆23Updated 3 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆33Updated this week
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆30Updated 4 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆63Updated last year
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Updated 3 weeks ago
- Check IOC provided by a MISP instance on Suricata events☆18Updated 6 years ago
- defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security events☆16Updated 2 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Updated 3 years ago
- A collection of my public YARA signatures for various malware families☆29Updated 10 months ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- Cockroach is your primitive & immortal swiss army knife.☆49Updated 3 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- Yara rules for detecting malware☆23Updated 11 months ago
- Bro analyzer that detects Google's QUIC protocol☆10Updated 4 years ago
- Fast lookup server for NSRL and other hash database used in digital forensic☆45Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 6 months ago
- A YARA Rule Performance Measurement Tool☆59Updated last year