enpoint detection / live analysis & sandbox host / signatures quality test
☆44Apr 22, 2021Updated 4 years ago
Alternatives and similar repositories for irma
Users that are interested in irma are comparing it to the libraries listed below
Sorting:
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆25May 29, 2023Updated 2 years ago
- ☆23Mar 17, 2024Updated last year
- ☆42Sep 16, 2022Updated 3 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Jun 11, 2017Updated 8 years ago
- Converting data from services like Censys and Shodan to a common data model☆52Updated this week
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Sep 18, 2023Updated 2 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Jan 18, 2023Updated 3 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- Volatility, on Docker 🐳☆41Nov 20, 2025Updated 3 months ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- Join RHEL and Debian based systems to Active Directory☆11Apr 18, 2020Updated 5 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Feb 15, 2022Updated 4 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- ☆22Jun 2, 2023Updated 2 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- gyp: A pure Go YARA parser☆107Mar 13, 2024Updated last year
- ☆24Sep 28, 2022Updated 3 years ago
- Powershell module for VMWare vSphere forensics☆167Nov 8, 2024Updated last year
- ☆14May 14, 2018Updated 7 years ago
- A curated collection of scripts for kernel-related devops☆13Nov 23, 2023Updated 2 years ago
- Command-line tool to search for malware samples in various repositories☆12Mar 3, 2022Updated 3 years ago
- ☆13Feb 25, 2021Updated 5 years ago
- Summarize CTI reports with OpenAI☆18Feb 16, 2026Updated last week
- function identification signatures☆12Apr 26, 2021Updated 4 years ago
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Apr 17, 2016Updated 9 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- `ctxio` gives `io.copy` operations the ability to cancel with context and retrieve progress data.☆12Sep 17, 2021Updated 4 years ago
- 5 cves of ntp 4.2.8p15 founded by me.☆12Apr 11, 2023Updated 2 years ago
- Forensic Artifact Collection Tool Matrix☆95Nov 9, 2024Updated last year
- Some YARA rules i will add from time to time☆67Mar 25, 2023Updated 2 years ago
- Knowing which rule should trigger according to the redcannary test☆11Nov 23, 2024Updated last year
- Kiddy - (linux) kernel identity spoofer☆15Mar 18, 2024Updated last year
- CryptoWall 3.0 Ransomware Reversing Documentation & Scripts☆17Nov 24, 2020Updated 5 years ago
- Napkin is a simple tool to produce statistical analysis of a text☆12Feb 25, 2024Updated 2 years ago
- A real-time Grafana dashboard using MISP ZeroMQ message queue and InfluxDB☆18Mar 15, 2024Updated last year
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago