binalyze / dfir-lab
☆10Updated 4 months ago
Alternatives and similar repositories for dfir-lab
Users that are interested in dfir-lab are comparing it to the libraries listed below
Sorting:
- Sigma Engine implementation in TypeScript☆28Updated 2 years ago
- ☆21Updated last year
- Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.☆36Updated 3 years ago
- Open Source Cyber Threat Intelligence Feed Collector☆16Updated 3 years ago
- enpoint detection / live analysis & sandbox host / signatures quality test☆44Updated 4 years ago
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆32Updated 3 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Updated 3 years ago
- my MSTICpy practice and custom tools repository☆11Updated 3 weeks ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆11Updated 8 months ago
- ATLAS - Malware Analysis Description☆21Updated last year
- log-slapper is an open-source offensive security tool designed for red-team operations as the post-exploit module and assessing your Splu…☆24Updated 7 months ago
- Malware Analysis (Zararlı Yazılım Analizi)☆31Updated 5 years ago
- Quickly fetches files from Wayback Machine.☆77Updated last year
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- C2 Active Scanner☆59Updated 10 months ago
- Detection rule validation☆41Updated last year
- This Repository gives the best and possible strategies against hunting the ransomware☆26Updated 2 years ago
- ☆12Updated 2 years ago
- ☆15Updated 5 years ago
- Chista | Open Threat Intelligence Framework☆58Updated 11 months ago
- A repo for security analytics & threat hunting resources☆21Updated 6 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- Go module for striping CDN IP ranges.☆24Updated 5 years ago
- The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field.…☆22Updated 3 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆64Updated last year
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- Secure image creator with wolfi packages.☆39Updated 3 months ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated last year
- Generates the tree of the directory listing page.☆49Updated last week