binalyze / dfir-lab
☆10Updated 2 weeks ago
Alternatives and similar repositories for dfir-lab:
Users that are interested in dfir-lab are comparing it to the libraries listed below
- ☆21Updated last year
- Sigma Engine implementation in TypeScript☆27Updated last year
- An ebpf based agent for monitoring security relevant events on Linux systems.☆32Updated last year
- Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.☆33Updated 2 years ago
- enpoint detection / live analysis & sandbox host / signatures quality test☆42Updated 3 years ago
- log-slapper is an open-source offensive security tool designed for red-team operations as the post-exploit module and assessing your Splu…☆23Updated 4 months ago
- ☆12Updated last year
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- Quickly fetches files from Wayback Machine.☆76Updated last year
- Open Source Cyber Threat Intelligence Feed Collector☆15Updated 3 years ago
- my MSTICpy practice and custom tools repository☆11Updated 2 months ago
- ATLAS - Malware Analysis Description☆20Updated last year
- Low budget VirusTotal Intelligence Cosplay☆20Updated 3 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated 9 months ago
- Active Directory Penetration Testing Tool☆27Updated 3 years ago
- Chista | Open Threat Intelligence Framework☆57Updated 8 months ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆11Updated 4 months ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- Carbon Black Response IR tool☆53Updated 4 years ago
- Go module for striping CDN IP ranges.☆24Updated 4 years ago
- Generates the tree of the directory listing page.☆49Updated 6 months ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆66Updated last month
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Updated 2 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆25Updated 2 years ago
- A repo for security analytics & threat hunting resources☆21Updated 6 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- C2 Active Scanner☆51Updated 7 months ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆45Updated this week
- ☆27Updated this week