dfrws / dfrws2018-challengeLinks
The DFRWS 2018 challenge (extended into 2019) is the second in a series of challenges dealing with Internet of Things (IoT). IoT is defined generally to include network and Internet connected devices usually for the purpose of monitoring and automation tasks. Consumer-grade “Smart” devices are increasing in popularity and scope. These devices an…
☆56Updated 4 years ago
Alternatives and similar repositories for dfrws2018-challenge
Users that are interested in dfrws2018-challenge are comparing it to the libraries listed below
Sorting:
- Scripts to analyze stuff☆146Updated 2 months ago
- General repository for compiled and uncompiled EnCase EnScripts☆46Updated 4 years ago
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABS☆82Updated 4 years ago
- Page File analysis tools.☆128Updated 9 years ago
- Parse Windows Prefetch files: Supports XP - Windows 10 Prefetch files☆120Updated last year
- Set of Yara rules for finding files using magics headers☆140Updated 5 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- repository of tools & resources of the MMD team☆134Updated 3 years ago
- Tools for DFIR☆120Updated 7 years ago
- A collection of infosec related scripts and information.☆53Updated last year
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆199Updated 7 months ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆265Updated 6 years ago
- Cuckoo Sandbox plugin for extracts configuration data of known malware☆135Updated last year
- Autoruns plugin for the Volatility framework☆122Updated 6 years ago
- Tool to help analyze PDF files☆187Updated 11 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆50Updated 2 years ago
- ☆24Updated 5 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Updated last year
- An advanced memory forensics framework☆96Updated 6 years ago
- A lightweight tool to load Windows Event Log evtx files into Elasticsearch.☆119Updated 4 years ago
- Differential Analysis of Malware in Memory☆212Updated 8 years ago
- Extension to Cuckoo Sandbox open source projects, adds support to AWS cloud functionalities and enables running emulation on auto-scaling…☆136Updated 3 years ago
- snake - a malware storage zoo☆217Updated 2 years ago
- Web App for Volatility framework☆386Updated 2 months ago
- ☆52Updated 7 years ago
- Malware Data Science Reading Diary / Notes☆129Updated 6 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆194Updated 8 years ago
- MAEC Schemas and Schema Development☆88Updated 5 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆270Updated 4 years ago
- Term concordances for each course in the SANS DFIR curriculum. Used for automated index generation.☆67Updated 5 years ago