chrisbdaemon / beartrapLinks
☆20Updated 9 years ago
Alternatives and similar repositories for beartrap
Users that are interested in beartrap are comparing it to the libraries listed below
Sorting:
- Some IR notes☆73Updated 9 years ago
- Credential Phish Analysis and Automation☆97Updated 7 years ago
- Mitre chopshop network decoder framework☆30Updated last month
- ☆16Updated 10 years ago
- Automated memory forensics analysis☆33Updated 6 years ago
- integrating bro into yara☆33Updated 10 years ago
- Manage VT Alerts☆62Updated 9 years ago
- Plugins for the Volatility framework☆18Updated 10 years ago
- Frontend for Codex Gigas☆21Updated 8 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 4 years ago
- Automation for VirusTotal☆31Updated 9 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Updated 8 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆44Updated 9 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Updated 9 years ago
- An ICAP Server with yara scanner for URL and content.☆59Updated 11 months ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 11 years ago
- Various public documents, whitepapers and articles about APT campaigns☆55Updated 9 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆98Updated 11 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 11 years ago
- Python script to pull various IOCs from PDFs☆15Updated 10 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆63Updated 10 years ago
- misc scripts☆36Updated 7 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Updated 7 years ago
- OpenCV based IDN option generator PoC☆39Updated 8 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆68Updated 10 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Updated 9 years ago
- **BETA** A simple buildscript for network security monitoring on RHEL/CentOS☆31Updated 8 years ago
- Cyber Intel Management☆50Updated 7 years ago
- Metadata Inspection Database Alerting System☆42Updated 12 years ago