dfrws / dfrws2018-challengeLinks
The DFRWS 2018 challenge (extended into 2019) is the second in a series of challenges dealing with Internet of Things (IoT). IoT is defined generally to include network and Internet connected devices usually for the purpose of monitoring and automation tasks. Consumer-grade “Smart” devices are increasing in popularity and scope. These devices an…
☆56Updated 3 years ago
Alternatives and similar repositories for dfrws2018-challenge
Users that are interested in dfrws2018-challenge are comparing it to the libraries listed below
Sorting:
- Parse Windows Prefetch files: Supports XP - Windows 10 Prefetch files☆118Updated last year
- Page File analysis tools.☆127Updated 9 years ago
- An advanced memory forensics framework☆94Updated 5 years ago
- A python application designed to remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local hos…☆161Updated 4 years ago
- General repository for compiled and uncompiled EnCase EnScripts☆46Updated 4 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆195Updated 3 months ago
- Autoruns plugin for the Volatility framework☆122Updated 5 years ago
- Differential Analysis of Malware in Memory☆212Updated 8 years ago
- Various capabilities for static malware analysis.☆78Updated 10 months ago
- Web App for Volatility framework☆381Updated 7 months ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆107Updated 5 years ago
- A lightweight tool to load Windows Event Log evtx files into Elasticsearch.☆117Updated 4 years ago
- Malware Analyst's Cookbook stuffs☆156Updated 9 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆142Updated 5 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆260Updated 6 years ago
- A collection of infosec related scripts and information.☆53Updated 9 months ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆194Updated 7 years ago
- ☆51Updated 6 years ago
- snake - a malware storage zoo☆216Updated last year
- Set of Yara rules for finding files using magics headers☆138Updated 4 years ago
- Detecting Lateral Movement with Machine Learning☆138Updated 7 years ago
- Process HTTP Pcaps With YARA☆103Updated 11 years ago
- A modern Python-3-based alternative to RegRipper☆197Updated 3 months ago
- Lazy Office Analyzer☆122Updated 8 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- repository of tools & resources of the MMD team☆131Updated 2 years ago
- The DFRWS 2017 challenge (extended into 2018) is about Internet of Things (IoT), defined generally to include network and Internet connec…☆21Updated 3 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Updated last year
- Windows Live Artifacts Acquisition Script☆188Updated 3 years ago