ahlashkari / VolMemLyzer
VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to generate a CSV file for each memory snapshot.
☆30Updated 7 months ago
Alternatives and similar repositories for VolMemLyzer:
Users that are interested in VolMemLyzer are comparing it to the libraries listed below
- Python based CLI for MalwareBazaar☆36Updated 2 months ago
- Standardized Malware Analysis Tool☆52Updated 3 years ago
- Various capabilities for static malware analysis.☆75Updated 4 months ago
- Modular malware analysis artifact collection and correlation framework☆53Updated 8 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- ☆57Updated 3 years ago
- Because phishtank was taken.. explore phishing kits in a contained environment!☆45Updated 2 years ago
- Yara Based Detection Engine for web browsers☆47Updated 3 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆21Updated 3 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- MAEC Schemas and Schema Development☆84Updated 4 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆59Updated 2 years ago
- Scans a malware file and lists down the related MBC (Malware Behavior Catalog) details.☆21Updated 2 years ago
- BlackBerry Threat Research & Intelligence☆96Updated last year
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆22Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆84Updated 2 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆57Updated 4 years ago
- ☆45Updated 6 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆111Updated last year
- Collection of YARA signatures from individual research☆42Updated last year
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Updated last year
- Malware Sandboxes & Malware Source☆84Updated 7 years ago
- Scripts and lists to help generate YARA friendly string mutations☆19Updated last year
- Automatic detection engineering technical state compliance☆53Updated 6 months ago
- Malware similarity platform with modularity in mind.☆76Updated 3 years ago
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆44Updated 8 months ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆19Updated 2 years ago
- Links to malware-related YARA rules☆14Updated 2 years ago
- Code for shelLM tool☆48Updated 2 months ago