adobe / libLOL
☆48Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for libLOL
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆131Updated 2 years ago
- CyCAT.org API back-end server including crawlers☆30Updated last year
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 2 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 3 weeks ago
- Automatic detection engineering technical state compliance☆50Updated 4 months ago
- ☆20Updated 6 months ago
- Lightweight Python-Based Malware Analysis Pipeline☆29Updated last month
- YaraScanner is a file pattern-matching tool based on YARA rules.☆54Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 6 months ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆94Updated 9 months ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆53Updated 3 years ago
- Visual Studio Code extension for MITRE ATT&CK☆52Updated 4 months ago
- Harvest Linux forensic data for operational triage of an event.☆50Updated 5 months ago
- Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked …☆33Updated 3 months ago
- Yara Based Detection Engine for web browsers☆47Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 2 years ago
- The core backend server handling API requests and task management☆31Updated last week
- Repository that contains a set of purposefully erroneous Yara rules.☆48Updated 10 months ago
- ☆79Updated last year
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Updated 3 years ago
- ☆27Updated this week
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆37Updated 3 years ago
- TAPIR is a multi-user, client/server, incident response framework☆44Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated 2 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆62Updated 2 years ago
- CSIRT Jump Bag☆27Updated 6 months ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆38Updated 2 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆125Updated last year
- Because phishtank was taken.. explore phishing kits in a contained environment!☆43Updated 2 years ago
- ☆41Updated 7 months ago