ahlashkari / VolMemLyzer
VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to generate a CSV file for each memory snapshot.
☆31Updated 9 months ago
Alternatives and similar repositories for VolMemLyzer:
Users that are interested in VolMemLyzer are comparing it to the libraries listed below
- MAEC Schemas and Schema Development☆86Updated 5 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆23Updated last year
- Various capabilities for static malware analysis.☆77Updated 6 months ago
- Yara Based Detection Engine for web browsers☆47Updated 3 years ago
- Python based CLI for MalwareBazaar☆36Updated 4 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Because phishtank was taken.. explore phishing kits in a contained environment!☆46Updated 2 years ago
- ☆57Updated 3 years ago
- ☆25Updated last year
- Augmentation to Machine Readable CTI☆27Updated 3 months ago
- This repository has been archived in favor of https://github.com/idaholab/Malcolm-Test-Artifacts☆33Updated 2 months ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆61Updated 2 years ago
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆46Updated 10 months ago
- Scans a malware file and lists down the related MBC (Malware Behavior Catalog) details.☆22Updated 2 years ago
- Three datasets to practice Threat Hunting against.☆42Updated last year
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆58Updated 5 years ago
- Malware similarity platform with modularity in mind.☆78Updated 3 years ago
- Random hunting ordiented yara rules☆95Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023☆77Updated last year
- Powershell sandboxing utility☆18Updated this week
- A cyber threat intelligence chatbot that ingested 2200+ reports from vx-underground.☆22Updated 11 months ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- Community modules for CAPE Sandbox☆91Updated this week
- Jupyter Notebooks for Cyber Threat Intelligence☆36Updated last year
- Modular malware analysis artifact collection and correlation framework☆53Updated 10 months ago
- Collection of scripts used to analyse malware or emails☆19Updated 4 years ago
- File analysis and management framework.☆82Updated last year
- Collection of YARA signatures from individual research☆43Updated last year
- Library of threat hunts to get any user started!☆42Updated 4 years ago