brootware / flarevm-up
Easy automated vagrant provisioning of Windows 10 with flarevm tools installed for Digital Forensics and Malware Analysis Lab.
☆16Updated 2 years ago
Alternatives and similar repositories for flarevm-up:
Users that are interested in flarevm-up are comparing it to the libraries listed below
- This repo is where I store my Threat Hunting ideas/content☆86Updated last year
- A GeoIP lookup utility utilizing ipinfo.io services.☆84Updated last year
- Dictionary of CTI-related acronyms, terms, and jargon☆140Updated last year
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆98Updated 11 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆50Updated last month
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆110Updated last year
- Digital Forensics Artifacts Knowledge Base☆76Updated 8 months ago
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆64Updated last year
- ☆64Updated 2 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆151Updated 7 months ago
- Repository of public reference frameworks for the DFIR community.☆110Updated last year
- TAPIR is a multi-user, client/server, incident response framework☆45Updated 2 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆128Updated 2 years ago
- Some Threat Hunting queries useful for blue teamers☆123Updated 2 years ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Updated 3 years ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆12Updated last year
- A curated list of KAPE-related resources☆160Updated 8 months ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated last year
- A script to collect (the most famous) Yara rules from more than 150 free resources. Free alternative to: https://valhalla.nextron-system…☆26Updated last year
- ☆64Updated 3 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 6 months ago
- BlackBerry Threat Research & Intelligence☆96Updated last year
- CarbonBlack EDR detection rules and response actions☆71Updated 4 months ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Updated 7 months ago
- yara detection rules for hunting with the threathunting-keywords project☆92Updated last week
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆45Updated 9 months ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆82Updated this week
- A ransomware group monitoring bot written in C#.☆55Updated 2 years ago
- Hunt malware with Volatility☆47Updated 8 months ago