dod-cyber-crime-center / Digital-Crime-Scene-ChallengeLinks
The object of the Digital Crime Scene Challenge is for participants to use their forensic and investigative skills to focus on potential digital evidence and conduct triage/analysis of such evidence.
☆39Updated 12 years ago
Alternatives and similar repositories for Digital-Crime-Scene-Challenge
Users that are interested in Digital-Crime-Scene-Challenge are comparing it to the libraries listed below
Sorting:
- Converting data from services like Censys and Shodan to a common data model☆50Updated 2 months ago
- isodump - ISO dump utility☆41Updated 6 years ago
- Home to the ActorTrackr source code☆29Updated 8 years ago
- ☆54Updated 5 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated last year
- Fast incident overview☆40Updated 8 years ago
- A simple many-rules to many-files YARA scanner for incident response or malware zoos.☆26Updated 7 years ago
- Yara rules to be used with the Burp Yara-Scanner extension☆49Updated 3 years ago
- A DFVFS Backed Forensic Viewer☆40Updated 5 years ago
- MantaRay Automated Computer Forensic Triage Tool☆63Updated 6 years ago
- Community modules for FAME☆65Updated last week
- Tools and script for my remnux/sift installation☆25Updated last month
- Deploy MISP Project software with Vagrant.☆44Updated 5 years ago
- CARET - A tool for viewing cyber analytic relationships☆55Updated 5 years ago
- Repository of yara rules☆60Updated 2 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 5 years ago
- Malquarium - Modern Malware Repository☆47Updated last week
- A curated list of malware repositories, trackers and malware analysis tools☆87Updated 2 years ago
- Please use https://github.com/veeral-patel/true-positive instead☆69Updated 2 years ago
- Various capabilities for static malware analysis.☆79Updated last year
- MAEC Schemas and Schema Development☆88Updated 5 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 7 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆93Updated 4 years ago
- Mass static malware analysis tool☆95Updated 3 years ago
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆28Updated 5 years ago
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆21Updated 6 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated this week
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 2 months ago
- Validates yara rules and tries to repair the broken ones.☆40Updated 5 years ago