fkie-cad / socbed
A Self-Contained Open-Source Cyberattack Experimentation Testbed
☆40Updated 2 months ago
Alternatives and similar repositories for socbed:
Users that are interested in socbed are comparing it to the libraries listed below
- An Adaptive Misuse Detection System☆38Updated 6 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- Python based CLI for MalwareBazaar☆37Updated 6 months ago
- yara detection rules for hunting with the threathunting-keywords project☆116Updated 2 months ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- YaraScanner is a file pattern-matching tool based on YARA rules.☆57Updated 2 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆34Updated 2 weeks ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- Look into EDR events from network☆23Updated last week
- A home for detection content developed by the delivr.to team☆69Updated 3 months ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- PowerShell Script Analyzer☆68Updated last year
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆77Updated last year
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆24Updated last year
- Linux #rootkit and #malware revealer☆24Updated 9 months ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- A MITRE Caldera plugin☆43Updated 5 months ago
- File analysis and management framework.☆82Updated last year
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated 3 weeks ago
- Lazarus analysis tools and research report☆56Updated last year
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆24Updated 2 years ago
- Yara Rules for Modern Malware☆77Updated last year
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated last year
- Standardized Malware Analysis Tool☆52Updated 4 years ago
- Windows symbol tables for Volatility 3☆84Updated 9 months ago
- ☆80Updated 2 years ago
- Surface Analysis System on Cloud☆19Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 2 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆27Updated 2 weeks ago