adobe / libLOL
☆48Updated 9 months ago
Alternatives and similar repositories for libLOL:
Users that are interested in libLOL are comparing it to the libraries listed below
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Updated last month
- ☆41Updated 9 months ago
- Automatic detection engineering technical state compliance☆53Updated 6 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆62Updated 2 years ago
- CyCAT.org API back-end server including crawlers☆30Updated last year
- Lightweight Python-Based Malware Analysis Pipeline☆30Updated this week
- This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆34Updated 2 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆130Updated 2 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆37Updated 3 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆38Updated 8 months ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆50Updated last week
- ☆79Updated last year
- OpenIOC rules to facilitate hunting for indicators of compromise☆38Updated 3 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆36Updated 10 months ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆31Updated 8 months ago
- BlackBerry Threat Research & Intelligence☆96Updated last year
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆22Updated last month
- Harvest Linux forensic data for operational triage of an event.☆50Updated 7 months ago
- Source code and examples for Antignis.☆36Updated 2 years ago
- All kinds of tiny shells☆58Updated last year
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆27Updated 10 months ago
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆61Updated 3 years ago
- Repository that contains a set of purposefully erroneous Yara rules.☆49Updated last year
- Some resources to facilitate my blog on auditd for security monitoring☆12Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆50Updated last month
- CSIRT Jump Bag☆27Updated 8 months ago