cloudina / hawkLinks
Multi Cloud Antivirus Scanning API using YARA and CLAMAV for AWS S3, Azure Blob Storage and GCP Cloud Storage
☆22Updated last year
Alternatives and similar repositories for hawk
Users that are interested in hawk are comparing it to the libraries listed below
Sorting:
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆33Updated 3 weeks ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Updated 3 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated 2 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆33Updated 5 years ago
- Integration between MISP platform and McAfee MVISION EDR☆14Updated 3 years ago
- Core server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)☆21Updated this week
- Fast lookup server for NSRL and other hash database used in digital forensic☆48Updated last week
- Repository of yara rules☆60Updated 3 years ago
- Yara rules to be used with the Burp Yara-Scanner extension☆49Updated 4 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 3 years ago
- ☆24Updated 3 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Updated 5 years ago
- ☆28Updated 7 months ago
- Validates yara rules and tries to repair the broken ones.☆41Updated 5 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 5 years ago
- Incident Response Network Tools☆24Updated 4 years ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Updated last year
- ExeFilter is an open-source tool and framework to filter file formats in e-mails, web pages or files. It detects many common file formats…☆70Updated 4 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated 2 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 5 years ago
- A collection of my public YARA signatures for various malware families☆30Updated last year
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 6 months ago
- Website crawler with YARA detection☆90Updated 2 years ago
- This repository regroups the Yara Rules for the Unprotect Project☆26Updated 5 years ago
- A mapping of used malware names to commonly known family names☆62Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 4 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Updated 2 years ago
- Repository with selected IOCs and YARA rules for threat hunting.☆35Updated 8 months ago
- Simple yara rule manager☆66Updated 3 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated last month