A FUSE module to mount captured network data
☆41Jun 20, 2025Updated 8 months ago
Alternatives and similar repositories for pcapFS
Users that are interested in pcapFS are comparing it to the libraries listed below
Sorting:
- Imports MSDN documentation into IDA Pro☆52Jan 10, 2012Updated 14 years ago
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- Konrads' Pen-Ultimate (Windows) Log File Parser☆14Dec 27, 2025Updated 2 months ago
- Scripts developed to help in mobile forensics investigations☆10Jul 4, 2017Updated 8 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Oct 10, 2018Updated 7 years ago
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆179Nov 16, 2023Updated 2 years ago
- Approximate matching using Hierarchical Bloom Filter Trees. Based on mrsh-v2.☆14Feb 20, 2021Updated 5 years ago
- Argos extension providing multifactor authentication (MFA/2FA) in GNOME☆11Oct 26, 2019Updated 6 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- A mapping of used malware names to commonly known family names☆62Feb 21, 2023Updated 3 years ago
- ☆32Jan 24, 2016Updated 10 years ago
- A tool to generate yara signatures from function blocks☆19Dec 8, 2014Updated 11 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- Create an incident response triage toolkit for use with Windows or Linux.☆18Jun 14, 2020Updated 5 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Jan 12, 2023Updated 3 years ago
- Scripts for communication with Bunitu Trojan C&Cs☆19Oct 29, 2015Updated 10 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Yara rules☆49Jan 28, 2014Updated 12 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 7 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- Zeek BACnet Parser - CISA ICSNPP☆22Nov 6, 2025Updated 4 months ago
- Parses Java Cache IDX files☆40Feb 28, 2018Updated 8 years ago
- ☆22Jul 8, 2022Updated 3 years ago
- dnssinkholelist is a python package focused on combining open source lists of malicious domains, dynamic dns domains, and advertisement d…☆18Apr 13, 2016Updated 9 years ago
- Library for structured fuzzing of ASN.1 DER/BER☆19Sep 6, 2022Updated 3 years ago
- ☆19Sep 2, 2018Updated 7 years ago
- This project aims at simplifying Windows API import recovery on arbitrary memory dumps☆262Mar 27, 2023Updated 2 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 6 years ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆96Jan 13, 2026Updated last month
- Set of Yara rules for finding files using magics headers☆142Sep 8, 2020Updated 5 years ago
- BYOVD collection☆24Mar 20, 2024Updated last year
- A collection of my reverse engineering and malware analysis write-ups☆21Dec 11, 2020Updated 5 years ago
- ☆20Feb 22, 2021Updated 5 years ago
- Modified edition of cuckoo community modules☆50May 12, 2017Updated 8 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Dec 24, 2019Updated 6 years ago
- Volatility Plugins☆22May 1, 2015Updated 10 years ago
- ☆26Apr 23, 2021Updated 4 years ago