certsocietegenerale / fameLinks
FAME Automates Malware Evaluation
☆916Updated 2 weeks ago
Alternatives and similar repositories for fame
Users that are interested in fame are comparing it to the libraries listed below
Sorting:
- Modular file scanning/analysis framework☆622Updated 6 years ago
- Online hash checker for Virustotal and other services☆836Updated 7 months ago
- Kaspersky's GReAT KLara☆718Updated last year
- Malware Configuration And Payload Extraction☆758Updated 11 months ago
- 16,432 Free Yara rules created by☆390Updated 6 years ago
- ☆1,089Updated 6 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆503Updated 3 years ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,094Updated this week
- Builds malware analysis Windows VMs so that you don't have to.☆1,047Updated 4 years ago
- An information security preparedness tool to do adversarial simulation.☆1,138Updated 6 years ago
- A collection of sources of indicators of compromise.☆916Updated 6 months ago
- CRITs - Collaborative Research Into Threats☆905Updated 6 years ago
- Clusters and elements to attach to MISP events or attributes (like threat actors)☆589Updated last week
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆468Updated 6 years ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,200Updated 3 months ago
- Indicators from Unit 42 Public Reports☆726Updated 2 months ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,299Updated 9 months ago
- Your Everyday Threat Intelligence☆1,925Updated last week
- Extract and aggregate threat intelligence.☆883Updated last year
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆929Updated last year
- Malcom - Malware Communications Analyzer☆1,163Updated 7 years ago
- DPS' Lightweight Investigation Notebook☆432Updated last year
- DFIRTrack - The Incident Response Tracking Application☆526Updated last year
- Tool to extract indicators of compromise from security reports in PDF format☆436Updated 2 years ago
- Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.☆509Updated last year
- YARA Rules I come across on the internet☆352Updated last year
- Python low-interaction honeyclient☆1,018Updated last week
- An open source framework for enterprise level automated analysis.☆396Updated 3 years ago
- Yara Rule Analyzer and Statistics☆394Updated 2 years ago
- Defanged Indicator of Compromise (IOC) Extractor.☆552Updated last year