VM setup for Malware RE labs
☆28Apr 26, 2019Updated 6 years ago
Alternatives and similar repositories for Meeseeks
Users that are interested in Meeseeks are comparing it to the libraries listed below
Sorting:
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- A lightweight C++/C AFF4 reader library☆14Feb 5, 2026Updated 3 weeks ago
- Various tools for creating Risen, Gothic and Elex mods.☆15Jun 22, 2025Updated 8 months ago
- Parser for Sdba memory pool tags☆21Jul 16, 2021Updated 4 years ago
- Forensic cheatsheets for use with cheat☆15Dec 2, 2021Updated 4 years ago
- Basic file metadata gathering script☆21Apr 16, 2025Updated 10 months ago
- A python script to shift the timestamp on syslog data. Useful for forensicators combating time skew.☆21May 19, 2022Updated 3 years ago
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Mar 13, 2022Updated 3 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Jul 18, 2018Updated 7 years ago
- A taxonomy and dictionary of malware behaviors.☆43Aug 20, 2019Updated 6 years ago
- Retro Game Engine inspired by the SNES-era☆25Sep 15, 2022Updated 3 years ago
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 5 months ago
- ☆24Aug 30, 2019Updated 6 years ago
- a collection of yara rules for binary analysis☆24Aug 24, 2017Updated 8 years ago
- Understanding Linux Kernel Vulnerability☆23Jan 9, 2018Updated 8 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆24Jul 9, 2021Updated 4 years ago
- Use Ghidra Structs in Python☆30Mar 28, 2021Updated 4 years ago
- Telco training☆26Oct 17, 2018Updated 7 years ago
- Rekall Memory Forensic Framework☆33Aug 5, 2019Updated 6 years ago
- ☆12Apr 8, 2025Updated 10 months ago
- Python library for parsing AccessData AD1 images☆33Jun 1, 2023Updated 2 years ago
- Triaging Windows event logs based on SANS Poster☆47Nov 22, 2025Updated 3 months ago
- $MFT parser (from live systems or a copy of the $MFT) and raw file copy utility☆38Jul 18, 2024Updated last year
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- Library of python scripts to apply Data Science in several forensics artifacts☆31Jul 16, 2020Updated 5 years ago
- C++ wrapper for YARA.☆45Jan 27, 2020Updated 6 years ago
- Threathunt details for the Solarwinds compromise☆33Jun 26, 2021Updated 4 years ago
- ☆38Jan 3, 2022Updated 4 years ago
- It is based on bulk_extractor (https://github.com/simsong/bulk_extractor) and add scanners for record carving☆42Apr 23, 2020Updated 5 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Aug 17, 2019Updated 6 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- Sample queries for Advanced hunting in Windows Defender ATP☆11Apr 22, 2020Updated 5 years ago
- ☆12Dec 14, 2016Updated 9 years ago
- Minimal C port of UTF8-CPP☆12Jun 2, 2019Updated 6 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- A running list of applications and processes that just do not work with the total absence of IPv4 on on a host☆15Aug 5, 2023Updated 2 years ago
- DEFCON-26 Workshop Lab Exercises☆12Aug 9, 2018Updated 7 years ago