dfrws / dfrws2018-challenge
The DFRWS 2018 challenge (extended into 2019) is the second in a series of challenges dealing with Internet of Things (IoT). IoT is defined generally to include network and Internet connected devices usually for the purpose of monitoring and automation tasks. Consumer-grade “Smart” devices are increasing in popularity and scope. These devices an…
☆57Updated 3 years ago
Alternatives and similar repositories for dfrws2018-challenge:
Users that are interested in dfrws2018-challenge are comparing it to the libraries listed below
- An advanced memory forensics framework☆94Updated 5 years ago
- Page File analysis tools.☆126Updated 9 years ago
- MoP - "Master of Puppets" - Advanced malware tracking framework☆82Updated 6 months ago
- The DFRWS 2017 challenge (extended into 2018) is about Internet of Things (IoT), defined generally to include network and Internet connec…☆20Updated 2 years ago
- A collection of infosec related scripts and information.☆53Updated 5 months ago
- General repository for compiled and uncompiled EnCase EnScripts☆46Updated 3 years ago
- Cuckoo running in a nested hypervisor☆128Updated 4 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆107Updated 4 years ago
- Various capabilities for static malware analysis.☆77Updated 5 months ago
- Parse Windows Prefetch files: Supports XP - Windows 10 Prefetch files☆115Updated 9 months ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆259Updated 6 years ago
- Set of tools for interacting with Malshare☆152Updated 5 years ago
- snake - a malware storage zoo☆218Updated last year
- Set of Yara rules for finding files using magics headers☆136Updated 4 years ago
- Scripts to analyze stuff☆146Updated 3 months ago
- Autoruns plugin for the Volatility framework☆121Updated 5 years ago
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆132Updated 2 years ago
- Collecting & Hunting for IOCs with gusto and style☆237Updated 3 years ago
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆192Updated 4 years ago
- A taxonomy and dictionary of malware behaviors.☆42Updated 5 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆194Updated 7 years ago
- Yet Another YARA rule Generator☆63Updated 6 years ago
- Differential Analysis of Malware in Memory☆211Updated 7 years ago
- A modern Python-3-based alternative to RegRipper☆192Updated 3 months ago
- Tools for DFIR☆119Updated 7 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆264Updated 3 years ago
- ☆82Updated 8 years ago
- repository of tools & resources of the MMD team☆131Updated 2 years ago
- Understanding ATT&CK Matrix for Enterprise☆80Updated 6 years ago
- Lazy Office Analyzer☆119Updated 8 years ago