fkie-cad / socbedLinks
A Self-Contained Open-Source Cyberattack Experimentation Testbed
☆43Updated 5 months ago
Alternatives and similar repositories for socbed
Users that are interested in socbed are comparing it to the libraries listed below
Sorting:
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- An Adaptive Misuse Detection System☆45Updated last year
- Lightweight Python-Based Malware Analysis Pipeline☆36Updated 2 months ago
- Python based CLI for MalwareBazaar☆39Updated 4 months ago
- YaraScanner is a file pattern-matching tool based on YARA rules.☆59Updated 2 years ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- ☆44Updated 4 months ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Updated 2 years ago
- Lazarus analysis tools and research report☆57Updated last year
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆67Updated last year
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆73Updated 5 months ago
- Standardized Malware Analysis Tool☆56Updated 4 years ago
- ☆15Updated 3 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Updated 3 years ago
- ☆33Updated last month
- ☆80Updated 2 years ago
- Yara station is a management portal for Neo23x0-Loki. The mission is to transform the standalone nature of the Loki scanner into a centra…☆36Updated 3 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Updated last month
- yara detection rules for hunting with the threathunting-keywords project☆153Updated 6 months ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated last month
- Repository with selected IOCs and YARA rules for threat hunting.☆35Updated 6 months ago
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆62Updated 5 months ago
- C2 Active Scanner☆60Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- A cyber threat intelligence chatbot that ingested 2200+ reports from vx-underground.☆32Updated last year